AWS Security Datasheet
Video Resource August 19, 2016

Practical Steps to Hack-Proofing AWS

About This Video

Migrating from the data center to the cloud requires us to rethink much of what we do to secure our applications. The idea of physical security morphs as infrastructure becomes virtualized by AWS APIs. In a new world of ephemeral, auto-scaling infrastructure, you need to adapt your security architecture to meet both compliance and security threats.

In the presentation we will cover topics including:

  • Minimize attack vectors and surface area
  • Perimeter assessments of your VPCs
  • Internal vs. External threats
  • Monitoring threats
  • Re-evaluating Intrusion Detection, Activity Monitoring, and Vulnerability Assessment in AWS

Latest Resources