{"id":1049,"date":"2023-03-19T10:58:21","date_gmt":"2023-03-19T05:28:21","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1049"},"modified":"2025-10-22T14:53:53","modified_gmt":"2025-10-22T09:23:53","slug":"security-best-practice-patterns-architecture-links-from-aws-gcp-azure-part-1","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2023\/03\/security-best-practice-patterns-architecture-links-from-aws-gcp-azure-part-1\/","title":{"rendered":"Security best practice, patterns &amp; architecture links from AWS, GCP &amp; Azure &#8211; Part 1"},"content":{"rendered":"\n<p>Herewith I am providing a curated list of links for security best practices, patterns &amp; architecture for AWS, GCP &amp; Azure &#8211; Part 1.<\/p>\n\n\n\n<p><strong><em>AWS:<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/wa.aws.amazon.com\/wat.pillar.security.en.html\">Security &#8211; AWS Well-Architected Framework (amazon.com)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/security-reference-architecture\/welcome.html\">AWS Security Reference Architecture (AWS SRA) &#8211; AWS Prescriptive Guidance (amazon.com)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.aws.amazon.com\/security\/\">AWS Security Documentation (amazon.com)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/patterns\/securityandcompliance-pattern-list.html\">Security, identity, compliance &#8211; AWS Prescriptive Guidance (amazon.com)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/aws.amazon.com\/security\/\">Cloud Security \u2013 Amazon Web Services (AWS)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/aws.amazon.com\/architecture\/?cards-all.sort-by=item.additionalFields.sortDate&amp;cards-all.sort-order=desc&amp;awsf.content-type=*all&amp;awsf.methodology=*all&amp;awsf.tech-category=*all&amp;awsf.industries=*all&amp;awsf.business-category=*all\">Reference Architecture Examples and Best Practices (amazon.com)<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong><em>GCP:<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/cloud.google.com\/architecture\/security-foundations\">Security foundations blueprint&nbsp;|&nbsp;Google Cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloud.google.com\/architecture\/framework\/security\/security-principles\">Security principles&nbsp;|&nbsp;Architecture Framework&nbsp;|&nbsp;Google Cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloud.google.com\/docs\/security\/infrastructure\/design\">Google infrastructure security design overview&nbsp;|&nbsp;Documentation&nbsp;|&nbsp;Google Cloud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/GoogleCloudPlatform\/security-analytics\">GitHub &#8211; GoogleCloudPlatform\/security-analytics: Community Security Analytics provides a set of community-driven audit &amp; threat queries for Google Cloud<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong><em>AZURE:<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/best-practices-and-patterns\">Security best practices and patterns &#8211; Microsoft Azure | Microsoft Learn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/framework\/security\/security-patterns\">Security patterns &#8211; Cloud Design Patterns | Microsoft Learn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/patterns\/\">Cloud design patterns &#8211; Azure Architecture Center | Microsoft Learn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/MicrosoftDocs\/azure-docs\/blob\/main\/articles\/security\/fundamentals\/best-practices-and-patterns.md\">azure-docs\/best-practices-and-patterns.md at main \u00b7 MicrosoftDocs\/azure-docs \u00b7 GitHub<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/overview\">Introduction to Azure security | Microsoft Learn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/paas-deployments\">Best practices for secure PaaS deployments &#8211; Microsoft Azure | Microsoft Learn<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong><em>Also, check out security as code products like oak9:<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/oak9.io\/\">oak9 | Security as Code Platform for Cloud Native Infrastructure<\/a><\/li>\n<\/ul>\n\n\n\n<p>Email me: Neil@HarwaniSystems.in<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Herewith I am providing a curated list of links for security best practices, patterns &amp; architecture for AWS, GCP &amp; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18,262,40],"tags":[264,263,61,9,265],"class_list":["post-1049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-architecture","category-cloud","category-cyber-security","tag-architecture","tag-cloud","tag-cyber-security","tag-security","tag-security-as-code"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1920%2C1324&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-gV","jetpack-related-posts":[{"id":965,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/10\/liferay-best-practices-part-1\/","url_meta":{"origin":1049,"position":0},"title":"Liferay best practices &#8211; Part 1","author":"Neil Harwani","date":"October 11, 2022","format":false,"excerpt":"Developers and managers both struggle at times to pre-plan usage of best practices in projects causing many problems which are best avoided. Providing below some learnings & best practices on using and working with Liferay \u2013 Part 1. Don\u2019t work directly on the Liferay database. Use the groovy script console\u2026","rel":"","context":"In &quot;Liferay&quot;","block_context":{"text":"Liferay","link":"https:\/\/www.techandtrain.com\/blog\/category\/liferay\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/10\/Web-Design.jpg?fit=1200%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/10\/Web-Design.jpg?fit=1200%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/10\/Web-Design.jpg?fit=1200%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/10\/Web-Design.jpg?fit=1200%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/10\/Web-Design.jpg?fit=1200%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":179,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/05\/skills-required-for-working-as-a-solution-architect\/","url_meta":{"origin":1049,"position":1},"title":"Skills required for working as a Solution Architect","author":"Neil Harwani","date":"May 26, 2018","format":false,"excerpt":"High level Architecture understanding about Clustering of Databases \/ Applications Servers \/ Operating Systems, Enterprise Architecture, Non Functional Requirements, Integrations, Various Enterprise Software Products & Frameworks Concepts of Virtualization and Cloud platforms like AWS, Azure & Google Cloud Integration - Tools, Frameworks & Products that can be used like ESB,\u2026","rel":"","context":"In &quot;Architecture&quot;","block_context":{"text":"Architecture","link":"https:\/\/www.techandtrain.com\/blog\/category\/architecture\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/05\/SA.jpg?fit=1080%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/05\/SA.jpg?fit=1080%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/05\/SA.jpg?fit=1080%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/05\/SA.jpg?fit=1080%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/05\/SA.jpg?fit=1080%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":505,"url":"https:\/\/www.techandtrain.com\/blog\/2019\/09\/enterprise-environment-software-areas-part-1\/","url_meta":{"origin":1049,"position":2},"title":"Enterprise environment software areas &#8211; Part 1","author":"Neil Harwani","date":"September 29, 2019","format":false,"excerpt":"Over the years that I have been working in IT industry, I have got the chance to be exposed to multiple enterprise (large & mid sized company environments) level software technologies, products & frameworks. These vary in a big way from company to company and project to project \/ program\u2026","rel":"","context":"In &quot;Enterprise Software&quot;","block_context":{"text":"Enterprise Software","link":"https:\/\/www.techandtrain.com\/blog\/category\/enterprise-software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/09\/Enterprise-Software.jpg?fit=960%2C640&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":358,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/09\/history-future-of-information-technology\/","url_meta":{"origin":1049,"position":3},"title":"History &#038; Future of Information Technology","author":"Neil Harwani","date":"September 22, 2018","format":false,"excerpt":"Late 1970s - Ethernet Late 1980s & Early 1990s - Internet Late 1990s - Y2K was the trend and revolution of easy operating systems like Windows with word processing and spreadsheets happened. Also, LINUX. ERP, CRM, BPM, HRM and similar software pick up in market. Early 2000s - Internet boom,\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/www.techandtrain.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/09\/Dream.jpg?fit=1200%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/09\/Dream.jpg?fit=1200%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/09\/Dream.jpg?fit=1200%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/09\/Dream.jpg?fit=1200%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/09\/Dream.jpg?fit=1200%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1421,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/02\/partyrock-aws-apps-part-1\/","url_meta":{"origin":1049,"position":4},"title":"PartyRock.aws apps &#8211; Part 1","author":"Neil Harwani","date":"February 20, 2025","format":false,"excerpt":"Here is a list of my experimentation with PartyRock@AWS since last 2 days. It seems like an amazing platform. Try out the 11 apps and do provide feedback. What is nice is that it creates apps with widgets and various flows using only one line of description. https:\/\/partyrock.aws\/u\/neil-hsopc\/8kdTd2eUX\/ResearchMate Welcome to\u2026","rel":"","context":"In &quot;AIML&quot;","block_context":{"text":"AIML","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiml\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/PartyRock.jpg?fit=1200%2C631&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/PartyRock.jpg?fit=1200%2C631&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/PartyRock.jpg?fit=1200%2C631&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/PartyRock.jpg?fit=1200%2C631&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/02\/PartyRock.jpg?fit=1200%2C631&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":1049,"position":5},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1049"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1049\/revisions"}],"predecessor-version":[{"id":1051,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1049\/revisions\/1051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/1050"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}