Return to Well-Architected Framework Guide
How do you classify your data?
- Identify the data within your workload
- Define data protection controls
- Automate identification and classification
- Define data lifecycle management
How do you protect your data at rest?
- Implement secure key management
- Enforce encryption at rest
- Automate data at rest protection
- Enforce access control
- Use mechanisms to keep people away from data
How do you protect your data in transit?
- Implement secure key and certificate management
- Enforce encryption in transit
- Automate detection of unintended data access
- Authenticate network communications
Top comments (0)