Implementing Mechanisms to Enforce Multi-Account Security in AWS
Training content
Introduction
As your organization develops, expands and continues to build more and more solutions within your AWS environment, it won't be too long before the need to implement multiple accounts arises. Running multiple accounts brings many benefits, but also some challenges as well. One of those challenges is how to manage, implement and monitor your resources for security threats, vulnerabilities and weaknesses both effectively and in a centralized manner for ease of operational support. This course will look at how to implement controls to resolve this challenge by analyzing some of the AWS services and features available to you to help you implement refined security controls across all of your accounts.
Outline
- Implementing cross-account access using IAM
- Configuring GuardDuty to manage multiple accounts for threat detection
- How to share CMKs across multiple accounts using KMS
- How to share resources across multiple accounts using Resource Access Manager
Intended Audience
Due to the nature of the content involved, the courses within this course are recommended for those that already have a foundational understanding of AWS and security, in addition to a working knowledge of some of the AWS security services.
Feedback
Please contact us at support@cloudacademy.com if you need help or guidance with this content. We welcome all questions, comments, and feedback.
About the Author
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 250+ courses relating to cloud computing reaching over 1 million+ students.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.