From the course: Complete Guide to the AWS Well-Architected Framework
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Security pillar evaluation - Amazon Web Services (AWS) Tutorial
From the course: Complete Guide to the AWS Well-Architected Framework
Security pillar evaluation
- [Narrator] Starting off with the security pillar, the most important pillar in my opinion, we're going to focus on three out of the 10 questions that are available for consideration in the security pillar. But before we look at the questions, let's look at the use case as it applies to security. So first up, it's a mobile application for financial investments. It's going to be accessed from phones and tablets. That's the idea. Also, it has to be accessible across the internet for customers. Data needs to be encrypted and the customers are going to need to be authenticated by an identity store outside of Amazon. The customers are going to need to be authenticated by a centralized identity store, so they're not authenticating directly to Amazon or they're not authenticating, say, to active directory at work. They're going to be accessing the application and they want to use their Facebook or Google logon to actually allow them to access the application. So some things that the…
Contents
-
-
-
-
-
-
-
-
-
-
(Locked)
Creating a Well-Architected Framework action plan2m 16s
-
(Locked)
Start an evaluation with the Well-Architected Framework Tool4m 28s
-
(Locked)
Security pillar evaluation7m 25s
-
(Locked)
Reliability pillar evaluation9m 16s
-
(Locked)
Performance efficiency pillar evaluation7m 56s
-
(Locked)
Operational excellence pillar evaluation3m 28s
-
(Locked)
Cost optimization pillar evaluation9m 2s
-
(Locked)
Sustainability pillar evaluation3m 16s
-
(Locked)
Review your workload evaluation2m 12s
-
(Locked)
Putting your workload evaluation into practice2m 1s
-
(Locked)
-