learning path

AWS WAF - Security Pillar SEC 1 - How do you securely operate your workload?

Up to 7h 41m
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

Training content

See all

This course has been designed to provide you with the knowledge and skills required to help you answer the following question from the Security pillar of the AWS Well Architected Framework, ‘How do you securely operate your workload?' 

To learn more about this section of the AWS Well architected framework see here, this guide will highlight every implementation step recommended by AWS.

SEC 1: How do you securely operate your workload?

This section of the AWS well architected framework is broken down into 8 different best practice subsections, each defining multiple recommendations.  These best practices are as follows:

  • SEC01-BP01 Separate workloads using accounts
  • SEC01-BP02 Secure account root user and properties
  • SEC01-BP03 Identify and validate control objectives
  • SEC01-BP04 Keep up-to-date with security threats
  • SEC01-BP05 Keep up-to-date with security recommendations
  • SEC01-BP06 Automate testing and validation of security controls in pipelines
  • SEC01-BP07 Identify threats and prioritize mitigations using a threat model
  • SEC01-BP08 Evaluate and implement new security services and features regularly

Based on these AWS well architected framework best practices, this course has been curated and devised to provide you with a path of recommended content including courses and labs to help you adhere and align to these security actions.  This course should be used as a knowledge guide for the services and features discussed, and in conjunction with the official AWS well architected framework which details the recommendations put forward by AWS within each best practice.

Learning Objectives

Upon completion, you will have the understanding and knowledge of being able to:

  • Identify potential security weaknesses and vulnerabilities relating to SEC 1
  • Plan proposals relating to SEC 1 to enable you to adhere to best practices
  • Implement environment changes based on your proposals


We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if you would like help getting started.

Your certificate for this learning path

About the Author

Learning paths

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 250+ courses relating to cloud computing reaching over 1 million+ students.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.

Covered Topics