Auditing Security Checklist for Use of AWS

Auditing Security Checklist for Use of AWS

Cover

Deploying an app on Amazon Web Services (AWS) is fast, easy, and cost-effective, but lacking a checklist to evaluate your use of AWS for the purposes of an internal review or external audit is risky.

This checklist is designed to help internal compliance teams and their external auditors assess their AWS security strategy. Use this resource to:

•    Evaluate the capability of AWS services to meet information security objectives
•    Ensure future deployments within the AWS cloud is done in a secure and compliant way
•    Assess the existing organizational use of AWS and to validate security leading practices
•    Develop AWS usage policies and/or validate that existing policies are being followed

Vendor:
Amazon Web Services and Intel
Posted:
16 Jul 2014
Published:
30 Jun 2014
Format:
PDF
Length:
21 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy