Providing users with a scalable and safe way to transfer their data into the cloud is fundamental for many applications. This pattern shows you how to use S3 to manage identity and access with IAM, secure the data with key management & encryption with KMS, maintain detective controls with CloudWatch, CloudTrail, ElasticSearch and on-boarding new users.
Check out our full collection of Back to Basics videos: https://aws.amazon.com/architecture/back-to-basics
Restricting S3 Bucket access with specific IAM roles – https://aws.amazon.com/blogs/security/how-to-restrict-amazon-s3-bucket-access-to-a-specific-iam-role/
Amazon S3 default encryption for S3 buckets – https://docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html
WA Security Pillar – https://wa.aws.amazon.com/wat.pillar.security.en.html#sec.detective
Anomaly detection with ElasticSearch – https://openlab.cern/sites/openlab.web.cern.ch/files/2019-11/Report_Jennifer_Andersson.pdf
Check out more resources for architecting in the #AWS cloud:
Publisher: Amazon Web Services
You can watch this video also at the source.