This project focuses on network segmentation and access control within AWS to separate departmental resources (e.g., HR, Finance, Engineering) and control traffic flow between them. By implementing AWS-native security tools such as VPCs, subnets, security groups, and network ACLs, we ensure least privilege network access and stronger security compliance.
(Diagram: AWS VPC with three departmental subnets, traffic controls via NACLs/Security Groups, and centralized monitoring via AWS CloudWatch/GuardDuty)
Service | Purpose |
---|---|
VPC | Base network for departmental segmentation. |
Subnets | Logical isolation for each department. |
Security Groups | Resource-level traffic control. |
Network ACLs | Subnet-level traffic filtering. |
IAM | Role-based access to manage resources. |
CloudWatch / GuardDuty | Monitoring and threat detection. |
Identify departments and required resources:
Example: