Join the Webinar
Well Architecting Your Security Pillar
View On-demand
Level: 200 | Intermediate
As customers progress through their cloud adoption journey, optimising workload for cost, performance and security can become complicated. Tools such as the Well-Architected Review process help prioritise time and resources to address critical issues. In this session, we’ll show you how to implement best practices from the Well-Architected Security Pillar. We’ll review relevant AWS services including Key Management Service, Identity and Access Management, GuardDuty and Security Hub; and topics such as logging.
Learning Objectives:
- Learn the why of the Well-Architected Security Pillar
- Learn how to optimise your security workloads
- Learn how to maintain and improve security posture
Who Should Attend: DevOps engineers, Security Engineers, users of AWS Security Services