Security¶
Implementing measures and practices to protect cloud resources, data, and applications from threats, ensuring compliance with regulations, and safeguarding user privacy.
Security Domains¶
| Domain | Description | Key Topics |
|---|---|---|
| Identity & Access Management (IAM) | Tools and services for managing user identities, access permissions, and authentication across cloud environments. | User identity management, Role-based access control, Multi-factor authentication, Single sign-on solutions |
| Threat Detection | Security services and tools for identifying, monitoring, and responding to potential threats and malicious activities in cloud environments. | Security monitoring, Anomaly detection, Incident response, Threat intelligence |
| Secret Management | Services and tools for securely storing, managing, and accessing sensitive information such as API keys, passwords, and certificates in cloud environments. | Credential storage, Key management, Certificate management, Secrets rotation |
| Compliance & Governance | Tools and frameworks for ensuring regulatory compliance, governance, and policy enforcement across cloud infrastructure and applications. | Regulatory compliance, Policy enforcement, Audit trails, Risk management |
Have any suggestions, additions, best-practices or references? Please contribute to help others learn!