AWS security governance at scale

Course Description

Security is foundational to AWS. Governance at scale is a brand-new concept for automating cloud governance that can assist companies in retiring manual processes in budget enforcement, account management, & security & compliance. By automating common challenges, an organization can scale without inhibiting speed, agility, or innovation. In addition, they can give decision-makers the control, visibility, & governance necessary to protect sensitive data & systems.

In this course, professionals will learn how to facilitate developer speed & agility, & incorporate preventive & detective controls. By the end of this course, professionals will be able to implement governance best practices.

 

Prerequisites

Before attending this course, participants should have completed the following- 

  • AWS Security Fundamentals course
  • AWS Security Essentials course

 

Optional-

  • AWS Cloud Management Assessment
  • Introduction to AWS Control Tower course
  • Automated Landing Zone course
  • Introduction to AWS Service Catalog course

Target Audience

This course is intended for-

  • Solutions architects, security DevOps, & security engineers

Course Objectives

In this course, you will learn to-

  • Inaugurate a landing zone with AWS Control Tower
  • Configure AWS Organizations to develop a multi-account environment
  • Apply identity management using AWS Single Sign-On users & groups
  • Federate access using AWS SSO
  • Enforce policies using prepackaged guardrails
  • Centralize logging using AWS CloudTrail & AWS Config
  • Enable cross-account security audits using AWS Identity & Access Management (IAM)
  • Describe workflows for provisioning accounts using AWS Service Catalog & AWS Security Hub

Content Outline

  • Course Introduction
  • Instructor Introduction
  • Learning objectives
  • Course structure & objectives
  • Course logistics & agenda
  • Governance at scale focal points
  • Business & Technical Challenges
  • Multi-account strategies, guidance, & architecture
  • Environments for agility & governance at scale
  • Governance with AWS Control Tower
  • Use cases for governance at scale
  • Enterprise environment challenges for developers
  • AWS Service Catalog
  • Resource creation
  • Workflows for provisioning accounts
  • Preventive cost & security governance
  • Self-service with existing IT service management (ITSM) tools
  • Lab 1- Deploy Resources for AWS Catalog
  • Create a new AWS Service Catalog portfolio & product.
  • Add an IAM role to a launch constraint to limit the actions the product can perform.
  • Grant access to an IAM role to view the catalog items.
  • Deploy an S3 bucket from an AWS Service Catalog product.
  • Operations aspect of governance at scale
  • Resource monitoring
  • Configuration rules for auditing
  • Operational insights
  • Remediation
  • Clean up accounts
  • Lab 2- Compliance & Security Automation with AWS Config
  • Apply Managed Rules through AWS Config to selected resources
  • Automate remediation based on AWS Config rules
  • Investigate the Amazon Config dashboard & verify resources & rule compliance Lab 3- Taking Action with AWS Systems Manager.
  • Setup Resource Groups for various resources based on common requirements
  • Perform automated actions against targeted Resource Groups Module 5- Resources
  • Explore additional resources for security governance at scale

FAQs

AWS provides security-specific tools & features across network security, configuration management, access control, & data encryption.

Scale Securely with Superior Visibility & Control. With AWS, you manage where your data is collected, who can access it, & what resources your organization is consuming at any given moment.

Automate & Reduce Risk with Deeply Integrated Services. ...

Build with the Highest Standards for Privacy & Data Security.

 

A data lake is a centralized & secured repository that collects all your data, both in its original form & prepared for analysis.

There are three methods of data storage namely –

  • Object storage
  • File storage
  • Block storage

EC2 is a service that enables business clients to run application programs in the computing environment.

AWS security provides opportunities to protect the data, check out security-related activity & receive automated responses.

Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & developmental platforms. Moreover, training courses are undertaken by some of the experts who have a vast range of experience in their domain.

Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

Yes, Radiant will provide you most updated, high, value & relevant real-time projects & case studies in each training program.

Technical issues are unpredictable & might occur with us as well. Participants have to ensure that they have access to the required configuration with good internet speed.

Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your need.

Send a Message.


  • Enroll