Guidance for Trusted Secure Enclaves on AWS
Protect and isolate your highly sensitive workloads with a secure enclave
Overview
How it works
Overview
This architecture diagram shows how to configure comprehensive, multi-account workloads with unique security and compliance requirements.

Organization Management Account
This architecture diagram shows how an organization can group multiple accounts, all controlled by a single customer entity. Follow the steps in this architecture diagram to deploy the Organization Management Account part of this Guidance.

Security Accounts
This architecture diagram shows how to centrally configure a comprehensive log collection across AWS services and accounts. Follow the steps in this architecture diagram to deploy the Security Accounts part of this Guidance.

Infrastructure Accounts
This architecture diagram shows how a centralized, isolated networking environment is built with Virtual Private Clouds (VPCs). Follow the steps in this architecture diagram to deploy the Infrastructure Accounts part of this Guidance.

Application, Community, Team, or Group Accounts (Sensitive)
This architecture diagram shows how to configure segmentation and separation between workloads belonging to different stages of the software development lifecycle, or between different IT administrative roles. Follow the steps in this architecture diagram to deploy the Application, Community, Team, or Group Accounts part of this Guidance.

Well-Architected Pillars
The architecture diagram above is an example of a Solution created with Well-Architected best practices in mind. To be fully Well-Architected, you should follow as many Well-Architected best practices as possible.
Related Content
Disclaimer
Did you find what you were looking for today?
Let us know so we can improve the quality of the content on our pages