CSA Talk May 2018

From Federal Burro of Information
Revision as of 17:46, 17 April 2018 by David (talk | contribs)
Jump to navigationJump to search

Sca

A Grab Bag of Security Practices

  • root mfa
  • using roles to access account from a cetnral place.
  • using peering to central manage
  • using config rules
  • IAM policy best practices.
  • Auditing and forensics.
    • the cloudtrail -> s3 -> cloudwatch trinity
    • s3 replication
    • s3 imutablity
    • Anomaly detection datadog
  • anti patterns
    • egress backhaul.
  • Partners and Vendor: what can my vendor do?