CSA Talk May 2018

From Federal Burro of Information
Revision as of 16:55, 17 April 2018 by David (talk | contribs) (Created page with " == A Grab Bag of Security Practices == * root mfa * using roles to access account from a cetnral place. * using peering to central manage * using config rules * IAM policy b...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

A Grab Bag of Security Practices

  • root mfa
  • using roles to access account from a cetnral place.
  • using peering to central manage
  • using config rules
  • IAM policy best practices.
  • Auditing and forensics.
    • the cloudtrail -> s3 -> cloudwatch trinity
    • s3 replication
    • s3 imutablity
    • Anomaly detection datadog
  • anti patterns
    • egress backhaul.
  • Partners and Vendor: what can my vendor do?