The Center for Internet Security (CIS) is a collaborative organization that creates directly actionable security configuration checklists. This makes them easier for non-security professionals to implement and provides a great deal of protection for a relatively small effort. This course, Securing AWS Using CIS Foundations Benchmark Security Standard, takes you through the CIS AWS Foundations Benchmark details and teaches you how to implement it at your company. First, you will learn about the benefits of the Benchmarks and the AWS Foundations Benchmark. Next, you will explore the benchmark protections and understand how to apply them. Finally, you'll have access to ready-to-use automation code to create a compliant AWS account. The code formulates a great base from which you can customize and create your own utility sets. By the end of this course, you'll feel confident in your knowledge of the most challenging aspects of compliance with the AWS Foundations Benchmark.
Course Overview Today's IT organizations have two top level priorities that are battling it out. Getting to the cloud as soon as possible, and avoid becoming the next victim of an IT security breach. Many security standards require internal IT staff and hired consultants working for months to produce a comprehensive company approach. And that's just the beginning. Making systems compliant and passing audits takes a lot of time and effort as well. The Center for Internet Security Benchmarks distinguish themselves among other security standards. Because, there are actionable technology-specific checklists. While you may need more than they provide for a truly comprehensive program, they can be a fast and leveraged payoff for the efforts spent. They can also be used as a first wave of a larger security effort, and they can be implemented by regular IT folks like you and me. Securing AWS using the CIS Foundations Benchmarks security standard, will help you understand and explain the benefits of the Benchmarks and then it delves into the AWS Foundations Benchmark. It will equip you to explain the benchmark protections and help you understand how to apply them. This course also contains a ready-to-use automation code to create a compliant AWS account. The code formulates a great base from which you can customize and create your own utility set. This course goes on to help you with one of the most challenging aspects of compliance with the AWS Foundations Benchmark, namely Least Privilege Security Group Engineering. The only way your company will win at the IT security game, is if everyone considers IT security to be a part of their job. My name is Darwin and I challenge you to roll up your sleeves and take your AWS environments to the next level of bulletproofing against the bad guys.