CSA Talk May 2018

From Federal Burro of Information
Revision as of 17:50, 17 April 2018 by David (talk | contribs)
Jump to navigationJump to search

Sca

A Grab Bag of Security Practices

  • root mfa
  • using roles to access account from a central place.
  • using peering to central manage.
    • Diagram
  • using config rules
  • IAM policy best practices.
  • Auditing and forensics.
    • the cloudtrail -> s3 -> cloudwatch trinity
    • s3 replication
    • s3 imutablity
    • Anomaly detection datadog
  • anti patterns
    • egress backhaul
  • Partners and Vendor: what can my vendor do?