38,757
edits
(Updating to match new version of source page) |
(Updating to match new version of source page) |
||
Line 12: | Line 12: | ||
* configuring security group rules that limit the services exposed to the Internet; | * configuring security group rules that limit the services exposed to the Internet; | ||
* implementing and testing backup and recovery procedures; | * implementing and testing backup and recovery procedures; | ||
* encrypting sensitive data in transit and/or at rest | |||
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. | * ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. | ||