Skip to content

AWS ‐ Security Controls

FullstackCodingGuy edited this page Feb 13, 2025 · 10 revisions

Objectives

image

Cloud Security Policies

Passwords

image image

image

Account Lockout Policies

image

  • Controlling Access
    • Blacklisting
    • Whitelisting

Cloud User Permissions

image image

image

image image

HIDS (Host-based Intrusion Detection Systems)

  • It evaluates the incoming and outgoing traffic of the host

  • It uses Signature based detection

  • Monitor and analyze systems

  • Monitor and analyze network packets

image

image

image

HIPS (Host-based Intrusion Prevention Systems)

  • It protects the network systems

image

image

Hardened Baselines for App Security

image

image

image

Clone this wiki locally