learning path

AWS WAF - Security Pillar SEC 2 - How do you manage authentication for people and machines?

Advanced
Up to 11h
46
5/5
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

Training content

10
6
See all

This course has been designed to provide you with the knowledge and skills required to help you answer the following question from the Security pillar of the AWS Well Architected Framework, ‘How do you manage authentication for people and machines?' 

To learn more about this section of the AWS Well architected framework see here, this guide will highlight every implementation step recommended by AWS.

SEC 2: How do you manage authentication for people and machines?

This section of the well architected framework is broken down into 6 different best practice subsections, each defining multiple recommendations. These best practices are as follows:

  • SEC02-BP01 Use strong sign-in mechanisms
  • SEC02-BP02 Use temporary credentials
  • SEC02-BP03 Store and use secrets securely
  • SEC02-BP04 Rely on a centralized provider
  • SEC02-BP05 Audit and rotate credentials periodically
  • SEC02-BP06 Leverage user groups and attributes

Based on these AWS well architected framework best practices, this course has been curated and devised to provide you with a path of recommended content including courses and labs to help you adhere and align to these security actions. This course should be used as a knowledge guide for the services and features discussed, and in conjunction with the official AWS well architected framework which details the recommendations put forward by AWS within each best practice.

Learning Objectives

Upon completion, you will have the understanding and knowledge of being able to:

  • Identify potential security weaknesses and vulnerabilities relating to SEC 2
  • Plan proposals relating to SEC 2 to enable you to adhere to best practices
  • Implement environment changes based on your proposals


Feedback

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if you would like help getting started.

Your certificate for this learning path

About the Author

Students
233,891
Labs
1
Courses
237
Learning paths
207

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 250+ courses relating to cloud computing reaching over 1 million+ students.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.

Covered Topics