Infrastructure (global network security)
Configuration and vulnerability analysis
Compliance Validation
Users, Groups, Roles, Policies management and monitoring
Enable MFA on all accounts
Rotate all your keys often
Use IAM tools to applu appropriate permissions
Analyse access patterns & review permissions
Last updated 2 years ago