Configurations

  • Use IAM
  • Use encryption
  • Perform regular security assessments