Well-Architected - Security
Implement least privilege, data protection, and detection with FCAI guardrails
Security
Protect data, systems, and assets through risk assessments and layered controls.
Practices
- Least privilege IAM; short-lived credentials and scoped roles.
- Encryption at rest and in transit; KMS key management.
- Detection: CloudTrail, GuardDuty, Security Hub triage.
- Incident response runbooks and exercises.
FCAI alignment
- IAM permission analyzer and scoped access checks.
- Findings enrichment and routing to service owners.
- Compliance views for tagging, encryption, and logging.