Join the Webinar
Well Architecting Your Security Pillar
As customers progress through their cloud adoption journey, optimising workload for cost, performance and security can become complicated. Tools such as the Well-Architected Review process help prioritise time and resources to address critical issues. In this session, we’ll show you how to implement best practices from the Well-Architected Security Pillar. We’ll review relevant AWS services including Key Management Service, Identity and Access Management, GuardDuty and Security Hub; and topics such as logging.
- Learn the why of the Well-Architected Security Pillar
- Learn how to optimise your security workloads
- Learn how to maintain and improve security posture
Who Should Attend: DevOps engineers, Security Engineers, users of AWS Security Services