In recent years, the Zero Trust model has been emerging in the IT world: the idea that you are skeptical about identities and constantly verifies users. But how do you build such a thing without driving users insane by typing in additional codes or other security questions?
You use AWS. It’s secure out of the box, but introducing security issues through misconfiguration is easy…
I found a checklist and I also added the best practices from AWS, this helps me in my daily work to guide me through potential security issues. This can and will help you to tighten up the security of your AWS infrastructure.
The purpose of this article is to remind you of the most urgent security measures that should be taken on your AWS infrastructure. It is by no means exhaustive, and it should be adapted to your specific business use cases.