38,757
edits
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 6: | Line 6: | ||
* configuring security group rules that limit the services exposed to the Internet; | * configuring security group rules that limit the services exposed to the Internet; | ||
* implementing and testing backup and recovery procedures; | * implementing and testing backup and recovery procedures; | ||
* encrypting sensitive data in transit and/or at rest | |||
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. | * ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. |