Secure Architectures
Implement security best practices and compliance.
Network Security
VPC Design
- Private and public subnets
- Security groups and NACLs
- VPC endpoints for private connectivity
Network Segmentation
- Isolate workloads by tier
- DMZ for public-facing resources
- Transit Gateway for connectivity
Identity and Access Management
IAM Best Practices
- Principle of least privilege
- Role-based access control
- Multi-factor authentication
Cross-Account Access
- IAM roles for cross-account
- Resource-based policies
- AWS Organizations SCPs
Data Protection
Encryption
- Encryption at rest and in transit
- AWS KMS for key management
- Client-side encryption
Data Classification
- Sensitive data identification
- Data loss prevention
- Compliance requirements