Security - eBook (EN)

AWS Security Checklist

Issue link: https://read.uberflip.com/i/1472544

Contents of this Issue

Navigation

Page 0 of 2

AWS Security Checklist This checklist provides customer recommendations that align with the Well – Architectured Framework Security Pillar. 1 3. Use multiple AWS accounts to separate workloads and workload stages such as production and non- production. Multiple AWS accounts allow you to separate data and resources, and enable the use of Service Control Policies to implement guardrails. AWS Control Tower can help you easily set up and govern a multi- account AWS environment. 4. Store and use secrets securely. Where you cannot use temporary credentials, like tokens from AWS Security Token Service, store your secrets like database passwords using AWS Secrets Manager which handles encryption, rotation, and access control. Identity & Access Management 1. Secure your AWS account. Use AWS Organizations to manage your accounts, use the root user by exception with multi-factor authentication (MFA) enabled, and configure account contacts. 2. Rely on centralized identity provider. Centralize identities using either AWS Single Sign-On or a third- party provider to avoid routinely creating IAM users or using long- term access keys—this approach makes it easier to manage multiple AWS accounts and federated applications. authentication (MFA) enabled, and configure account contacts. 1

Articles in this issue

Links on this page

view archives of Security - eBook (EN) - AWS Security Checklist