Section 6:Data Protection
So far, you have invested time in setting up your AWS account using secure best practices, added your users to least privileged roles, and made sure that any services that you are using are following secure guidelines. After performing all these operations, you can begin to feel confident that the data and applications running in your accounts have a much better chance of being protected than before.
Your organization’s data differentiates it from others in its own industry as well as competing industries. You, as the security professional, must take the final precautions so that there are no opportunities for someone to capture and reassemble the data packets traveling between endpoints, which would otherwise put your intellectual property at risk. You also don’t want your users or customers to fall victim to any incident where their personally identifiable information is exposed. Through the final section of this book, as you prepare...