Implementing security best practices requires an understanding of the shared responsibility model; once you understand your responsibilities, you can begin to architect and implement additional levels of security throughout your environment. Adhering to best practices from the outset will significantly help to protect your data and resources from a wide variety of threats, risks, and exposures, both internally and externally.
This chapter has focused on some of the common security best practices, some of which may be referenced within the certification. Understanding the reasoning behind the best practice helps you to protect against the threat in a structured way.
New threats are being defined and exposed all the time, and so it's important to keep revisiting your security strategy, to ensure that it is still meeting all the requirements stipulated within your Information...