CSA Talk May 2018
From Federal Burro of Information
Sca
A Grab Bag of Security Practices
- root mfa
- using roles to access account from a cetnral place.
- using peering to central manage
- using config rules
- IAM policy best practices.
- Auditing and forensics.
- the cloudtrail -> s3 -> cloudwatch trinity
- s3 replication
- s3 imutablity
- Anomaly detection datadog
- anti patterns
- egress backhaul.
- Partners and Vendor: what can my vendor do?