Return to Well-Architected Framework Guide
How do you protect your network resources?
- Create network layers
- Control traffic at all layers
- Automate network protection
- Implement inspection and protection
How do you protect your compute resources?
- Perform vulnerability management
- Reduce attack surface
- Implement managed services
- Automate compute protection
- Enable people to perform actions at a distance
- Validate software integrity
Top comments (0)