Guidance for Baseline Security Assessment on AWS
Overview
How it works
These technical details feature an architecture diagram to illustrate how to effectively use this solution. The architecture diagram shows the key components and their interactions, providing an overview of the architecture's structure and functionality step-by-step.
Get Started
Well-Architected Pillars
The architecture diagram above is an example of a Solution created with Well-Architected best practices in mind. To be fully Well-Architected, you should follow as many Well-Architected best practices as possible.
Security
For secure authentication and authorization, Lambda is granted access to AWS services on the least privilege basis with read-only permissions. Single Lambda functions are deployed in this guidance and are inaccessible from the internet. The customer can view and download an assessment report within the AWS Well-Architected portal, which can only be accessed by logging into the customer's account. No additional data is stored anywhere else in the customer’s account.
Reliability
Lambda utilizes logs and metrics which are sent to Amazon CloudWatch where the data is analyzed for risks. Using a single CloudFormation template allows customers to easily install and uninstall resources.
Performance Efficiency
Lambda is purpose built for this Guidance, allowing the customer to change the custom lens and modify the Lambda function to meet their security needs.
Cost Optimization
Using only the minimum resources required, this Guidance scales to meet demand by using serverless services to deliver the security assessment. Costs are incurred only for the resources consumed.
Sustainability
This Guidance uses fully managed serverless services that scale with demand, and allow customers to continually match their loads using only the minimum resources required.
Disclaimer
Did you find what you were looking for today?
Let us know so we can improve the quality of the content on our pages