From the course: Complete Guide to the AWS Well-Architected Framework

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Security pillar evaluation

Security pillar evaluation

- [Narrator] Starting off with the security pillar, the most important pillar in my opinion, we're going to focus on three out of the 10 questions that are available for consideration in the security pillar. But before we look at the questions, let's look at the use case as it applies to security. So first up, it's a mobile application for financial investments. It's going to be accessed from phones and tablets. That's the idea. Also, it has to be accessible across the internet for customers. Data needs to be encrypted and the customers are going to need to be authenticated by an identity store outside of Amazon. The customers are going to need to be authenticated by a centralized identity store, so they're not authenticating directly to Amazon or they're not authenticating, say, to active directory at work. They're going to be accessing the application and they want to use their Facebook or Google logon to actually allow them to access the application. So some things that the…

Contents