Please enable JavaScript to use this site.

2

18

1

glance-speakers-details

0

22-character Vidyard video ID

2023-01-01

0

17:00

13:00

8:00

false

Thank you for your interest. You will receive a confirmation email with more information in your inbox shortly.

At a glance

In this whitepaper

Today’s businesses have more employees than ever working remotely, so safe access to cloud services is a top priority. Understandably, the significant growth in the types of workloads, assets, and services in AWS is driving renewed interest in zero trust architecture and controls.

Download this whitepaper from SANS Institute and AWS, Building a Successful Zero Trust Strategy for Data Analytics, to explore the core elements of a zero trust strategy for access and control in AWS. Learn about network-based services and the variety of controls that help you build a successful zero trust model.

Featured content

Date
Time
  •  

Featured content

North America
  •  
Europe & Africa
  •  
Asia-Pacific
  •  

Featured content

1-2

About the partner

1-3 descriptive, relevant, and short sentences.

Who should download

1-3 descriptive, relevant, and short sentences.

Authors

The name of Speaker 1. You can have up to 24 speakers. Unused tokens should be deleted.

The position, company of Speaker 1. You can have up to 24 speakers. Unused tokens should be deleted.

The name of Speaker 2. You can have up to 24 speakers. Unused tokens should be deleted.

The position, company of Speaker 2. You can have up to 24 speakers. Unused tokens should be deleted.

The name of Speaker 3. You can have up to 24 speakers. Unused tokens should be deleted.

The position, company of Speaker 3. You can have up to 24 speakers. Unused tokens should be deleted.

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Peccy

Peculiar Ways, Amazon

Details

Preview

To achieve a balanced and manageable zero trust model for AWS, organizations will likely make use of a range of different controls as well as security and operational program elements, some of which are built into AWS and others that are procured from AWS Marketplace partners, offering best-in-class security and cloud services.

With AWS, critical pieces of any zero trust strategy include identity awareness, flexibility in workload and asset protection, and trustworthiness.

Key elements of an AWS zero trust strategy should include:


  • Granular identity-based and context-based controls, including user and service authentication and authorization and role assignment

  • Flexible network segmentation and micro-segmentation within the cloud infrastructure

  • Monitoring and deep visibility into all activity in the environment to best facilitate detection and response
  • Additional info

    Print length: 14 pages
    Language: English
    Estimated read time: 11 minutes

    Download a copy

    Download a copy