Speakers
Synopsis
Ever wondered how to write a security pattern for cloud?
We'll begin by exploring the concept and purpose of security patterns. While there are different definitions exist in the industry and from cloud providers (AWS, Azure, GCP) we'll focus on how to navigate and identify the most practical and meaningful ones.
Next, we'll delve into techniques for writing and using effective security patterns, highlighting best practices and common pitfalls to avoid.
To illustrate these concepts, we'll present a real-world example of security by design using patterns in the context of protecting workloads hosted in AWS (as the example cloud provider).
We’ll showcase an example security pattern for a specific AWS service, which can be adaptable to any cloud provider.
We'll then examine how security patterns can enhance overall security and why they offer a more practical approach compared to relying solely on security standards.
You'll discover how security patterns are integrated into "security by design" for both architecture and assurance, and how they enable more efficient risk assessment. We'll contrast this with the challenges of risk assessment using standards alone, demonstrating why patterns offer a more effective measure.