{"id":11002,"date":"2014-07-02T09:12:45","date_gmt":"2014-07-02T09:12:45","guid":{"rendered":"http:\/\/www.cloudcomputing-news.net\/news\/2014\/jul\/02\/aws-security-best-practices-multi-factor-authentication-beyond\/"},"modified":"2014-07-02T09:12:45","modified_gmt":"2014-07-02T09:12:45","slug":"aws-security-best-practices-multi-factor-authentication-and-beyond","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/aws-security-best-practices-multi-factor-authentication-and-beyond\/","title":{"rendered":"AWS security best practices: Multi-factor authentication and beyond"},"content":{"rendered":"<p>Last week, the news that Code Spaces suffered a breach that overnight put the company out of business and cost their clients untold millions reminded everyone in the IT community how devastating a major data security breach can be for our companies and clients.&nbsp;<\/p>\n<p>At Logicworks, we manage highly available, compliant cloud infrastructure on Amazon Web Services, and in the wake of this catastrophe, we decided to publish a list of AWS security best practices.<\/p>\n<p>Data security is not binary. &nbsp;Best practices are to use defense in depth and continuously evaluate what improvements can be made and how the threats are changing. &nbsp;AWS, and public cloud computing in general, provide many new capabilities, but along with that come new threats and new tools to counter them. &nbsp;Here are some of our recommendations to improve AWS security and build a good foundation for a secure scalable environment.<\/p>\n<p><strong>Improving Amazon Web Services &#8230;<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, the news that Code Spaces suffered a breach that overnight put the company out of business and cost their clients untold millions reminded everyone in the IT community how devastating a major data security breach can be for our companies and&#8230;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-11002","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=11002"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11002\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=11002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=11002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=11002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}