Mile2 Cybersecurity Certifications

Reply To: OCU C)SP D Week 03 Lesson 07 Discussion

#109720
Mjulius513
Participant

When I was working at AWS, keeping the network secure was always a top priority. We used different types of controls to protect data and systems. Physical controls included locked server rooms, security badges, and cameras to prevent unauthorized access. Technical controls like firewalls, encryption, multi-factor authentication (MFA), and antivirus software helped block hackers and keep information safe. We also had administrative controls, such as password policies, access limits, and regular employee training to make sure everyone followed security rules. Monitoring tools were used to watch network activity and quickly detect any unusual behavior. We regularly made backups and had incident response plans in case of a security breach. Access controls made sure only the right people could reach certain systems or data. By using all these layers of protection together, AWS created a strong and secure network environment that kept both company and customer data safe at all times.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.