Shift Gears: How to Leverage Data-Centric Security Controls in AWS

Adopting a Data-Centric Approach to Security in Amazon S3, Redshift, RDS and DynamoDB 

When your cloud engineers leverage the power of different AWS services, data is constantly generated, duplicated, and moved. For example, ETLs might move sensitive data from S3 to Redshift for BI or log analysis, or a developer might copy data into an environment with a lower security posture for application testing. While this data democratization and freedom is critical for the business, it creates risks around inappropriate access, unauthorized exfiltration, and weakened security postures. 

This webinar will tackle the different components of adopting a data-centric approach to securing data across AWS services by setting proper data access controls, knowing where your business critical sensitive data is, who created it, and how it should be secured.

You will learn how to:

  1. Set coarse grained and fine grained access controls for your sensitive AWS data
  2. Monitor data movement and activity to detect whether sensitive data has the correct AWS security controls, based on context
  3. Leverage the right tools to strengthen your data security posture


Date: 10 May

Time: 11:00 EST / 15:00 GMT