Seminare
Seminare

Live-Online: AWS Security Governance at Scale

Webinar - Haufe Akademie GmbH & Co. KG

Learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices.
Termin Ort Preis*
07.06.2024 online 904,40 €
27.08.2024 online 904,40 €
*Alle Preise verstehen sich inkl. MwSt.

Detaillierte Informationen zum Seminar

Inhalte:

Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.

Course Introduction

  • Instructor introduction
  • Learning objectives
  • Course structure and objectives
  • Course logistics and agenda 

Module 1: Governance at Scale

  • Governance at scale focal points
  • Business and Technical Challenges

Module 2: Governance Automation

  • Multi-account strategies, guidance, and architecture
  • Environments for agility and governance at scale
  • Governance with AWS Control Tower 
  • Use cases for governance at scale

Module 3: Preventive Controls

  • Enterprise environment challenges for developers
  • AWS Service Catalog
  • Resource creation
  • Workflows for provisioning accounts
  • Preventive cost and security governance
  • Self-service with existing IT service management (ITSM) tools
  • Lab 1: Deploy Resources for AWS Catalog
  1. Create a new AWS Service Catalog portfolio and product
  2. Add an IAM role to a launch constraint to limit the actions the product can perform
  3. Grant access for an IAM role to view the catalog items
  4. Deploy an S3 bucket from an AWS Service Catalog product

Module 4: Detective Controls

  • Operations aspect of governance at scale
  • Resource monitoring
  • Configuration rules for auditing
  • Operational insights 
  • Remediation
  • Clean up accounts
  • Lab 2: Compliance and Security Automation with AWS Config
  1. Apply Managed Rules through AWS Config to selected resources
  2. Automate remediation based on AWS Config rules
  3. Investigate the Amazon Config dashboard and verify resources and rule compliance
  • Lab 3: Taking Action with AWS Systems Manager
  1. Setup Resource Groups for various resources based on common requirements
  2. Perform automated actions against targeted Resource Groups

Module 5: Resources

  • Explore additional resources for security governance at scale
Dauer/zeitlicher Ablauf:
1 day
Ziele/Bildungsabschluss:
  • Establishing a landing zone with AWS Control Tower
  • Configuring AWS Organizations to create a multi-account environment
  • Implementing identity management using AWS Single Sign-On users and groups
  • Federating access using AWS SSO
  • Enforcing policies using prepackaged guardrails
  • Centralizing logging using AWS CloudTrail and AWS Config
  • Enabling cross-account security audits using AWS Identity and Access Management (IAM)
  • Defining workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub
Zielgruppe:

This course is intended for the following job roles:

  • Solution Architect
  • Cyber Security

We recommend that attendees of this course have attended the following course (or equivalent knowlege):
AWS Security Best Practices.

Seminarkennung:
33896
Nach unten
Nach oben
Wir setzen Analyse-Cookies ein, um Ihre Zufriedenheit bei der Nutzung unserer Webseite zu verbessern. Diese Cookies werden nicht automatisiert gesetzt. Wenn Sie mit dem Einsatz dieser Cookies einverstanden sind, klicken Sie bitte auf Akzeptieren. Weitere Informationen finden Sie hier.
Akzeptieren Nicht akzeptieren









Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha



Bei der Verarbeitung Ihrer personenbezogenen Daten im Zusammenhang mit der Kontaktfunktion beachten wir die gesetzlichen Bestimmungen. Unsere ausführlichen Datenschutzinformationen finden Sie hier. Bei der Kontakt-Funktion erhobene Daten werden nur an den jeweiligen Anbieter weitergeleitet und sind nötig, damit der Anbieter auf Ihr Anliegen reagieren kann.







Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha