As customers progress through their cloud adoption journey, optimising workload for cost, performance and security can become complicated. Tools such as the Well-Architected Review process help prioritise time and resources to address critical issues. In this session, we’ll show you how to implement best practices from the Well-Architected Security Pillar. We’ll review relevant AWS services including Key Management Service, Identity and Access Management, GuardDuty and Security Hub; and topics such as logging.