FCAI Wiki

Well-Architected - Security

Implement least privilege, data protection, and detection with FCAI guardrails

Security

Protect data, systems, and assets through risk assessments and layered controls.

Practices

  • Least privilege IAM; short-lived credentials and scoped roles.
  • Encryption at rest and in transit; KMS key management.
  • Detection: CloudTrail, GuardDuty, Security Hub triage.
  • Incident response runbooks and exercises.

FCAI alignment

  • IAM permission analyzer and scoped access checks.
  • Findings enrichment and routing to service owners.
  • Compliance views for tagging, encryption, and logging.