home_banner

Content Icon

AWS Security Checklist (Updated)

June 19, 2020 | Tools & Templates | Cloud Application and Data Controls

While there are many security best practices for organizations making the move to Amazon Web Services (AWS), this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Enterprise Collaboration Tool Usage Has Surged During COVID-19

Enterprise use of collaboration cloud services has more than doubled sine the beginning of the year, with Zoom (+350%), Microsoft Teams (+300%), and Slack (+200%) seeing some of the largest gains. But the largest increase was seen by Cisco Webex, with 600% increase during that same period.

IANS Cloud Security Update: Q2 2020

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. This quarterly research report updates IANS’ clients on the new developments occurring in the cloud security arena.

Provide Granular IAM Access/Roles to Kubernetes Pods in AWS

AWS grants permissions to use its resources at the EC2 instance level, not the Kubernetes pod level. This report details ways to get around the issue and ensure your pods support least privilege. 

Secure MongoDB in the Cloud

To secure MongoDB within Google Cloud Platform (GCP) or any other cloud provider environment, users must follow MongoDB's STIG recommendations in addition to CIS benchmarks. This report lists the main control areas to focus on.