Providing users with a scalable and safe way to transfer their data into the cloud is fundamental for many applications. This pattern shows you how to use S3 to manage identity and access with IAM, secure the data with key management & encryption with KMS, maintain detective controls with CloudWatch, CloudTrail, ElasticSearch and on-boarding new users.
Additional Resources:
Restricting S3 Bucket access with specific IAM roles - https://aws.amazon.com/blogs/security/how-to-restrict-amazon-s3-bucket-access-to-a-specific-iam-role/
Amazon S3 default encryption for S3 buckets - https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html
WA Security Pillar - https://wa.aws.amazon.com/wat.pillar.security.en.html#sec.detective
Anomaly detection with ElasticSearch - https://openlab.cern/sites/openlab.web.cern.ch/files/2019-11/Report_Jennifer_Andersson.pdf
Check out more resources for architecting in the #AWS cloud:
http://amzn.to/3qXIsWN
#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudStorage #S3
Additional Resources:
Restricting S3 Bucket access with specific IAM roles - https://aws.amazon.com/blogs/security/how-to-restrict-amazon-s3-bucket-access-to-a-specific-iam-role/
Amazon S3 default encryption for S3 buckets - https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html
WA Security Pillar - https://wa.aws.amazon.com/wat.pillar.security.en.html#sec.detective
Anomaly detection with ElasticSearch - https://openlab.cern/sites/openlab.web.cern.ch/files/2019-11/Report_Jennifer_Andersson.pdf
Check out more resources for architecting in the #AWS cloud:
http://amzn.to/3qXIsWN
#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudStorage #S3
- Category
- Amazon Web Services
- Tags
- AWS, Amazon Web Services, Cloud

Be the first to comment