Amazon Web Services (AWS) is the leader in the public cloud market. They offer a broad set of services that help organizations move faster, lower IT costs, and scale applications. Like most cloud providers, AWS operates under a shared responsibility model — managing security of the cloud while AWS customers are responsible for security in the cloud. Threats to your workloads running in AWS can take many forms: • Compromise of the AWS account • Data leakage or system compromise through insecure configurations • Breaches through publicly presented applications that are not thoroughly assessed or monitored • And more... Use this checklist as a guide to the activities and references you need to start building a secure foundation for your workloads or assess existing setups
Please fill all the required * fields.
By clicking 'Download Now' you agree to our Terms of Use. We take your privacy seriously. For more information please read our Privacy Policy. By registering with the Enterprise Guide you will automatically receive our weekly Product Update and Technology Insider eNewsletters.