Section 1 - Instruction

Welcome to AWS Security & Identity! Security is the foundation of everything you do in the cloud. When you use AWS, you're trusting them with your data and applications. But how do you know your trust is well-placed?

Engagement Message

What's your biggest concern when it comes to cloud security?

Section 2 - Instruction

AWS invests billions of dollars and has world-class experts dedicated to securing its global infrastructure. Their business depends on it. This is why major banks, governments, and other highly regulated industries trust AWS with their most sensitive data.

Engagement Message

Can you think of an organization that would have very strict security requirements?

Section 3 - Instruction

To provide a clear and structured approach to security, AWS created the Well-Architected Framework. This framework is built on several pillars, including a dedicated Security Pillar that guides you on how to build secure systems on AWS.

Engagement Message

Why is having a structured framework important when dealing with complex topics like security?

Section 4 - Instruction

The Security Pillar is organized around five key areas. These are: Identity and Access Management, Detective Controls, Infrastructure Protection, Data Protection, and Incident Response.

Let's briefly touch on what each one means.

Engagement Message

Which of these five areas sounds the most interesting to you?

Section 5 - Instruction

Identity and Access Management is about ensuring only the right people and services have access. Data Protection focuses on securing your data using methods like encryption. Infrastructure Protection deals with securing your network and systems from external threats.

Engagement Message

Which of these three do you think is the first line of defense?

Sign up
Join the 1M+ learners on CodeSignal
Be a part of our community of 1M+ users who develop and demonstrate their skills on CodeSignal