Overview
Description
Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.
In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices.
Course Objectives
In this course, you will learn to:
- Establish a landing zone with AWS Control Tower
- Configure AWS Organizations to create a multi-account environment
- Implement identity management using AWS Single Sign-On users and groups
- Federate access using AWS SSO
- Enforce policies using prepackaged guardrails
- Centralize logging using AWS CloudTrail and AWS Config
- Enable cross-account security audits using AWS Identity and Access Management (IAM)
- Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub
Prerequisites
We recommend that attendees of this course have:
- AWS Security Essentials
Course duration / Price
1 day / € 895.00 (excl. tax) per person (DE)
Course outline
Course Introduction
- Instructor introduction
- Learning objectives
- Course structure and objectives
- Course logistics and agenda
Module 1: Governance at Scale
- Governance at scale focal points
- Business and Technical Challenges
Module 2: Governance Automation
- Multi-account strategies, guidance, and architecture
- Environments for agility and governance at scale
- Governance with AWS Control Tower
- Use cases for governance at scale
Module 3: Preventive Controls
- Enterprise environment challenges for developers
- AWS Service Catalog
- Resource creation
- Workflows for provisioning accounts
- Preventive cost and security governance
- Self-service with existing IT service management (ITSM) tools
- Lab 1: Deploy Resources for AWS Catalog
- Create a new AWS Service Catalog portfolio and product
- Add an IAM role to a launch constraint to limit the actions the product can perform
- Grant access for an IAM role to view the catalog items
- Deploy an S3 bucket from an AWS Service Catalog product
Module 4: Detective Controls
- Operations aspect of governance at scale
- Resource monitoring
- Configuration rules for auditing
- Operational insights
- Remediation Clean up accounts
- Lab 2: Compliance and Security Automation with AWS Config
- Apply Managed Rules through AWS Config to selected resources
- Automate remediation based on AWS Config rules
- Investigate the Amazon Config dashboard and verify resources and rule compliance
- Lab 3: Taking Action with AWS Systems Manager
- Setup Resource Groups for various resources based on common requirements
- Perform automated actions against targeted Resource Groups
Module 5: Resources
- Explore additional resources for security governance at scale
IMPORTANT: Please bring your notebook (Windows, Linux or Mac) to our trainings. If this is not possible, please contact us in advance.
The practical exercises are performed in prepared working environments available via web browser – no software needs to be installed. The course material is in English, spoken language can be in german or english. Other languages like spanish, portuguese or french, please contact us under training@tecracer.de
Highlights
- Automated Governance with AWS Tools: Learn how to implement governance at scale using AWS Control Tower, AWS Organizations, and AWS Service Catalog to automate account management, budget enforcement, and security controls.
- Preventive and Detective Controls: Gain hands-on experience in applying preventive controls like resource creation workflows and detective controls such as AWS Config and Systems Manager for monitoring and compliance automation.
- Enhanced Security and Agility: Discover best practices for balancing developer agility with robust security governance, while ensuring sensitive data and systems are protected through centralized logging and cross-account security audits.
Details
Unlock automation with AI agent solutions

Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
This offer does not include a support package. Please contact training@tecracer.de if you have any questions.