Return to Well-Architected Framework Guide
How do you securely operate your workload?
- Separate workloads using accounts
- Secure AWS account
- Identify and validate control objectives
- Keep up to date with security threats
- Keep up to date with security recommendations
- Automate testing and validation of security controls in pipelines
- Identify and prioritize risks using a threat model
- Evaluate and implement new security services and features regularly
Top comments (0)