Checklist icon

Cloud Network and Host Controls

Amazon Web Services (AWS) Checklist

by IANS Faculty

While there are many security best practices for organizations making the move to Amazon Web Services (AWS), this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.

This checklist will help guide you through the steps to avoid threats to your workflows, including:

  • Compromise of the AWS account
  • Data leakage or system compromise through insecure configurations
  • Breaches through publicly presented applications that are not thoroughly assessed or monitored


Complete the form and we’ll send a copy of the security checklist to your email.

Fill out the form to receive your content download.  
* Required Fields

Featured IANS Content

Guide icon

Identity and Access Management

Privileged Access Management (PAM) Decision-Maker

by Idan Shoham, IANS Faculty

Privileged access should be provided to authorized users based on context vs. a one-size-fits-all approach. These workflows are designed to help you determine which accounts or groups should be managed by a PAM process and then how best to grant that privileged access.

See Details
Guide icon

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.

See Details
Infographic icon

Wireless Networks

Wi-Fi Security Best Practices

by IANS Research

Improperly secured Wi-Fi networks give hackers an easy path to stealing sensitive corporate data. This infographic -- intended for employee security awareness -- details the attack types that exploit weak Wi-Fi security and offers tips for strong home Wi-Fi network security.

See Details