Skip to content

Security

Implementing measures and practices to protect cloud resources, data, and applications from threats, ensuring compliance with regulations, and safeguarding user privacy.

Security Domains

Domain Description Key Topics
Identity & Access Management (IAM) Tools and services for managing user identities, access permissions, and authentication across cloud environments. User identity management, Role-based access control, Multi-factor authentication, Single sign-on solutions
Threat Detection Security services and tools for identifying, monitoring, and responding to potential threats and malicious activities in cloud environments. Security monitoring, Anomaly detection, Incident response, Threat intelligence
Secret Management Services and tools for securely storing, managing, and accessing sensitive information such as API keys, passwords, and certificates in cloud environments. Credential storage, Key management, Certificate management, Secrets rotation
Compliance & Governance Tools and frameworks for ensuring regulatory compliance, governance, and policy enforcement across cloud infrastructure and applications. Regulatory compliance, Policy enforcement, Audit trails, Risk management

Have any suggestions, additions, best-practices or references? Please contribute to help others learn!