1. Security Domains
    1. Identity & access management
      1. Use cases
        1. Manage access and federation
        2. Identify assets, workloads and allowed relationships
        3. Establish organizational-wise guardrails
        4. Map to one or more security frameworks and identify gaps that need addressing
      2. Native services
        1.  AWS Identity & Access Management (IAM)
        2.  AWS Single Sign-On
        3.  Amazon Cognito
        4.  AWS Directory Service
        5.  AWS Config
        6.  AWS Resource Access Manager
        7.  AWS Organizations
    2. Security monitoring & threat detection
      1. Use cases
        1. Increase visibility across accounts & regions
        2. Enhance security posture
        3. Detect and investigate findings and security alerts
        4. Automate responses natively and/or with 3party solutions
      2. Best practice
      3. Native services
        1.  AWS Security Hub
        2.  Amazon GuardDuty
        3.  Amazon Inspector
        4.  Amazon Detective
        5.  AWS CloudTrail
        6.  AWS IoT Device Defender
    3. Edge/perimeter protection
      1. Use cases
        1. Ensure information to/from cloud is protected at all times
        2. Protect against DDoS attacks
        3. Protects against application attacks
        4. Monitor and alert on internal malicious traffic
      2. Native services
        1.  AWS Network Firewall
        2.  AWS Shield
        3.  AWS Web Application Firewall (WAF)
        4. Amazon Route53 Resolver DNS Firewall
        5.  AWS Firewall Manager
    4. Data Protection
      1. Use cases
        1. Identify and protect sensitive data
        2. Encrypt data in motion and at rest
        3. Implement regional and data sovereignty use cases
        4. Recover from incidents
      2. Native services
        1.  Amazon Macie
        2.  AWS Key Management Service (KMS)
        3.  AWS CloudHSM
        4.  AWS Certificate Manager
        5.  AWS Secrets Manager
        6.  CloudEndure Disaster Recovery
    5. Compliance & data privacy
      1. Use cases
        1. Implement privacy and compliance controls
        2. View and collect data to support audit requirements
      2. Native services
        1.  AWS Artifact
        2.  AWS Audit Manager
        3. Wickr
    6. Alignment against NIST
  2. AWS Managed Services
    1. AWS Managed Services FAQs
    2. Use cases
      1. Accelerated Data Center Migration
      2. Turnkey Cloud Operating Model
      3. Staff Augmentation
    3. AMS Business Value
      1. Why AMS ?
        1. Availability - Proactive monitoring, incident management, and backup
        2. Efficiency - Improved operational efficiency and cost savings
        3. Compliance - Acts as compliance acclerator, like PCI, SOC, ISO etc
        4. Security - Detective Controls & Remediations
      2. What is AMS?
        1. In the cloud Operational Excellence Provider
          1. Designated named resources, CSDM, CA
          2. 24/7 Operation
          3. SLA backed by finacial credit
        2. AMS Scope and limitations
          1. AMS Service Description clearly documents AMS scope and RACI
          2. AMS do not manage customer application and data layer, we help customer with their AWS infrastructure Operation
      3. Where does AMS fit?
        1. In the business as usual (BAU), Operate phase
        2. How is AMS different from Enterprise Support?
          1. How is AMS different from Enterprise Support?
      4. Does AMS lock in?
        1. AMS Contract is month on month
          1. Customer can keep the AMS best practice and learning after AMS is out
        2. NO, there is no lock in with AMS
      5. How about AWS Partner working with AMS
        1. AMS loves Partners. AMS has a curated list of Partners
          1. Partner can reduce significant operational risk and cost when working with AMS
        2. Considerable number of our deals are partner led
      6. AMS for Mutlti or Hybrid Cloud
        1. As of now AMS is only available for AWS
    4. AMS Operation Plans
      1. Accelerate
        1. Recommended when customer is already in AWS and prefers augmentation
        2. User guide
      2. Advanced
        1. Recommended when customer is looking for a full end-to-end solution
        2. User guide
        3. Onboarding guide
        4. AMS responsibility matrix (RACI)
        5. Information resources
        6. Supported AWS services
        7. Features
          1. Logging, Monitoring, Guardrails, and Event Management
          2. Continuity management (Backup and Restore)
          3. Security and access management
          4. Patch management
          5. AMS standard patch for traditional account-based patching, and
          6. AMS Patch Orchestrator, for tag-based patching.
          7. Change management
          8. Submit provisioning and configuration Requests for Change (RFCs)
          9. Deploy through AWS Service Catalog
          10. Deploy through Direct Change mode
          11. Deploy through Developer mode. Remember that the resources created through the Developer mode are not managed by AMS.
          12. Configure AWS services directly using self-service provisioning for select AWS services (see Supported AWS services).
          13. Incident management
          14. Problem management
          15. Reporting
          16. Service request management
          17. Service Desk (24x7 365 days a year)
          18. Designated resources
          19. Cloud Service Delivery Manager
          20. Cloud Architect
          21. Developer mode
          22. AWS support
          23. Customer-managed account
          24. Firewall management
        8. Compliance
      3. Detailed side-by-side table
      4. Operations on Demand
        1. Curated catalog
        2. Operational expertise
        3. Pay for what you use
    5. Customers
    6. Partners
    7. Resources
  3. AWS Professional Services
    1. AWS Security Assurance Services LLC (PCI-QSAC & HITRUST and others)
  4. Learning & Guidance
    1. Shared Responsibility Model
    2. Whitepapers, Technical Guides, and Reference Materials
    3. Security Documentation
    4. Provable Security: Research and Insights
    5. Training
      1. Cloud Audit Academy
    6. AWS Security Control Domains
    7. International Content
    8. Workshops
  5. Security Software - AWS Marketplace
  6. Security Partners
    1. Managed Security Service Providers (MSSP)
      1. Level 1 MSSP Competency Partners
        1. AWS Infrastructure Vulnerability Scanning
        2. AWS Resource Inventory Visibility
        3. AWS Security Best Practices Monitoring
        4. AWS Compliance Monitoring
        5. Monitor and Triage Security Events
        6. 24/7 Incident Alerting and Response
        7. Distributed Denial of Service (DDoS) Mitigation
        8. Managed Intrusion Prevention System (IPS)
        9. Managed Detection and Response (MDR) for AWS-Based Endpoints
        10. Managed Web Application Firewall
      2. Managed Security Services on AWS Marketplace
    2. Security Competency Partners
      1. Network and Infrastructure Security
      2. Host and Endpoint Security
      3. Data Protection and Encryption
      4. Governance, Risk, and Compliance (Software/Hardware)
      5. Logging, Monitoring, SIEM, Threat Detection, and Analytics
      6. Identity and Access Control
      7. Vulnerability and Configuration Analysis
      8. Application Security
      9. Security Engineering
      10. Governance, Risk, and Compliance
      11. Security Operations and Automation