Skip to content

AWS ‐ Security Controls

FullstackCodingGuy edited this page Feb 12, 2025 · 10 revisions

Objectives

image

Cloud Security Policies

Passwords

image image

image

Account Lockout Policies

image

  • Controlling Access
    • Blacklisting
    • Whitelisting

Cloud User Permissions

image image

image

image image

HIDS (Host-based Intrusion Detection Systems)

  • It evaluates the incoming and outgoing traffic of the host

  • It uses Signature based detection

  • Monitor and analyze systems

  • Monitor and analyze network packets

HIPS (Host-based Intrusion Protection Systems)

Clone this wiki locally