home_banner `

Content Icon

AWS Security Checklist

October 26, 2018 | Tools & Templates | Cloud Application and Data Controls

While there are many security best practices for organizations making the move to Amazon Web Services (AWS) accounts and environments, this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

IANS Cloud Security Update: Q2 2019

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Best Practices for Migrating to Office 365

Given the sheer number of options and apps available in Office 365, establishing security governance across it all can be daunting. In this Ask-an-Expert written response, IANS Faculty Matthew Chiodi emphasizes the importance of strategy and programmatic policy enforcement in the process. 

Know What and How to Monitor Within Office 365

Deciding among the multitude of monitoring and event collection options within Office 365 is difficult at best. In this Ask-an-Expert written response, IANS Faculty Mick Douglas details the most important events to monitor, and says which can be kept in the cloud and which should be pulled into your SIEM.

Best Practices for IAM and Monitoring in AWS

Strong identity and access management (IAM) and monitoring are critical to AWS success. In this Ask-an-Expert written response, IANS Faculty George Gerchow details best practices/tools for both, as well as some pitfalls to avoid.