Protecting data, systems and assets is the highest priority for a Business running on Cloud. Security is “job zero” as stated in AWS guidelines. Controlling who has access to which resource is a decisive task to eliminate risk of mis-use and interferences across teams.
Security at all layers
Instead of only filtering access at network boundaries, Cloud infrastructure allows to perform a defense in depth where all the involved components implements security rules. Critical Data can then be protected at rest and in transit, complying with all level of confidentiality.
RBAC
“Role Based Access Control” allows an organization to restrict access to resources only to authorized users. A fined grained policy can be applied on any user based on its position. Combined with a strict encryption management, this approach meets the best practices in term of security.