The Center for Internet Security (CIS) is a collaborative organization that creates directly actionable security configuration checklists. This makes them easier for non-security professionals to implement and provides a great deal of protection for a relatively small effort. This course, Securing AWS Using CIS Foundations Benchmark Security Standard, takes you through the CIS AWS Foundations Benchmark details and teaches you how to implement it at your company. First, you will learn about the benefits of the Benchmarks and the AWS Foundations Benchmark. Next, you will explore the benchmark protections and understand how to apply them. Finally, you'll have access to ready-to-use automation code to create a compliant AWS account. The code formulates a great base from which you can customize and create your own utility sets. By the end of this course, you'll feel confident in your knowledge of the most challenging aspects of compliance with the AWS Foundations Benchmark.
Today's IT organizations have two top level priorities that are battling it out - [a] getting to the cloud as soon as possible and [b] avoid becoming the next victim of an IT security breach.
Many security standards require internal IT staff and hired consultants working for months to produce a comprehensive company approach. And that's just the beginning - making systems compliant and passing audits take a lot of time and effort as well.
The Center for Internet Security Benchmarks distinguish themselves among other security standards because they are actionable, technology specific checklists. While you may need more than they provide for a truly comprehensive program, they can be a fast and leveraged payoff for the effort spent. They can also be used as the first wave of a larger security effort and they can be implemented by regular IT folks like you and me.
Securing AWS Using the CIS Foundation Benchmark Security Standard will help you
understand and explain the benefits of the Benchmarks and then delves into the AWS Foundations Benchmark.It will equip you to explain the benchmark protections and help you understand how to apply them.
This course also contains ready to use automation code to create a compliant AWS account.The code forumates a great base from which you can customize and create your own utility sets.
This course goes on to help you with one of the most challenging aspects of compliance with the AWS Foundations Benchmark - namely least privilege security group engineering.
The only way your company will win at the IT security game is if everyone considers IT security to be part of their job.
My name is Darwin and I challenge you to roll up your sleeves and take your AWS environments to the next level of bullet proofing against the bad guys.