Section 4:Infrastructure Security
Up until this point, you have looked at the different types of attacks that your accounts could be at risk of while managing your day-to-day security responsibilities, along with how to use the services provided by AWS to respond to those incidents. This included instructions on how to gather metrics and logs to keep track of the activity happening in your accounts contained within your AWS Organization.
Protecting the perimeter of your accounts, like placing a fence around your property, is both a deterrent and a barrier for keeping those who are unwanted out of your account. You can’t rely on perimeter protection alone, so ensuring that the instances running your applications are using secure best practices is also necessary. Managing access to your data via a trackable system that leaves a trail of auditable logs is essential, not only for just those companies running with a need for compliance but for almost every enterprise.
...