Index
1. Manage your account information
2. Use multi-factor authentication
I. Getting started
7. Intentional data policies
8. Centralize AWS CloudTrail Logs
III. Making data useful
9. Take actions on findings
10. Be involved in the dev cycle
IV. Taking security to the next level
V. What's next?
3. Don't hardcode secrets
4. Validate IAM roles
5. Limit security groups
6. Rotate your keys
II. Controlling access