At a glance
In this whitepaper
Today’s businesses have more employees than ever working remotely, so safe access to cloud services is a top priority. Understandably, the significant growth in the types of workloads, assets, and services in AWS is driving renewed interest in zero trust architecture and controls.
Download this whitepaper from SANS Institute and AWS, Building a Successful Zero Trust Strategy for Data Analytics, to explore the core elements of a zero trust strategy for access and control in AWS. Learn about network-based services and the variety of controls that help you build a successful zero trust model.
Featured content
Featured content
Featured content
1-2
About the partner
1-3 descriptive, relevant, and short sentences.
Who should download
1-3 descriptive, relevant, and short sentences.
Authors
The name of Speaker 1. You can have up to 24 speakers. Unused tokens should be deleted.
The position, company of Speaker 1. You can have up to 24 speakers. Unused tokens should be deleted.
The name of Speaker 2. You can have up to 24 speakers. Unused tokens should be deleted.
The position, company of Speaker 2. You can have up to 24 speakers. Unused tokens should be deleted.
The name of Speaker 3. You can have up to 24 speakers. Unused tokens should be deleted.
The position, company of Speaker 3. You can have up to 24 speakers. Unused tokens should be deleted.

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon

Peccy
Peculiar Ways, Amazon
Details
Preview
To achieve a balanced and manageable zero trust model for AWS, organizations will likely make use of a range of different controls as well as security and operational program elements, some of which are built into AWS and others that are procured from AWS Marketplace partners, offering best-in-class security and cloud services.
With AWS, critical pieces of any zero trust strategy include identity awareness, flexibility in workload and asset protection, and trustworthiness.
Key elements of an AWS zero trust strategy should include: