4.2 Implement data and infrastructure protection strategies
  • Enforce a data classification scheme
  • Create, manage, and protect encryption keys
  • Implement encryption at rest (for example, AWS Key Management Service [AWS KMS])
  • Implement encryption in transit (for example, AWS Certificate Manager, VPN)
  • Securely store secrets by using AWS services (for example, AWS Secrets Manager, Systems Manager Parameter Store)
  • Review reports or findings (for example, AWS Security Hub, Amazon GuardDuty, AWS Config, Amazon Inspector)
No Attachment Found
No Attachment Found
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare