Control Layers
- IAM controls who can call APIs and under what conditions.
- KMS key policies and grants control key administration and usage.
- CloudTrail records API activity for audit and investigation.
- AWS Config records configuration history and evaluates compliance rules.
Threat and Edge Controls
- GuardDuty detects suspicious activity from logs and telemetry.
- Security Hub aggregates findings and compliance checks.
- WAF protects web applications with web ACLs and rules.
- Shield Advanced adds enhanced DDoS protection and response support.
Practice Security & Compliance Questions
Put your knowledge to the test with practice questions.