Back to Basics: Bulk Data Storage

9 Views
Published
Providing users with a scalable and safe way to transfer their data into the cloud is fundamental for many applications. This pattern shows you how to use S3 to manage identity and access with IAM, secure the data with key management & encryption with KMS, maintain detective controls with CloudWatch, CloudTrail, ElasticSearch and on-boarding new users.

Additional Resources:
Restricting S3 Bucket access with specific IAM roles - https://aws.amazon.com/blogs/security/how-to-restrict-amazon-s3-bucket-access-to-a-specific-iam-role/
Amazon S3 default encryption for S3 buckets - https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html
WA Security Pillar - https://wa.aws.amazon.com/wat.pillar.security.en.html#sec.detective
Anomaly detection with ElasticSearch - https://openlab.cern/sites/openlab.web.cern.ch/files/2019-11/Report_Jennifer_Andersson.pdf

Check out more resources for architecting in the #AWS cloud:
http://amzn.to/3qXIsWN

#AWS #AmazonWebServices #CloudComputing #BackToBasics #CloudStorage #S3
Category
Amazon Web Services
Tags
AWS, Amazon Web Services, Cloud
Be the first to comment