Control: AWS > Well-Architected Tool > AWS Well-Architected Framework > Security > SEC 06. How do you protect your compute resources?
Compute resources in your workload require multiple layers of defense to help protect from external and internal threats. Compute resources include EC2 instances, containers, AWS Lambda functions, database services, IoT devices, and more.
See SEC 06. How do you protect your compute resources? for more information.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
- SEC 06. How do you protect your compute resources?
- SEC 06. How do you protect your compute resources? > Enable people to perform actions at a distance
- SEC 06. How do you protect your compute resources? > Automate compute protection
- SEC 06. How do you protect your compute resources? > Implement managed services
- SEC 06. How do you protect your compute resources? > Reduce attack surface
- SEC 06. How do you protect your compute resources? > Validate software integrity
- SEC 06. How do you protect your compute resources? > Perform vulnerability management
Category
In Your Workspace
Developers
- tmod:@turbot/aws-wellarchitected-framework#/control/types/sec06
- tmod:@turbot/turbot#/control/categories/cmdb
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-wellarchitected-framework#/control/types/sec06"
Get Controls
Control Type URI
Category URI
GraphQL
CLI