Skip to content
Well Architected Guide
Menu
Menu
Well Architected Pillars
Documents
Search for Well Architected Advice
Incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle
Build a program that embeds security ownership in workload teams
Centralize services for packages and dependencies
Manual code reviews
Automate testing throughout the development and release lifecycle
Train for application security
Regularly assess security properties of the pipelines
Deploy software programmatically
Perform regular penetration testing
Main
Security
Incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle
Category - Incorporate and validate the security properties of applications throughout the design, development, and deployment lifecycle
Articles
Build a program that embeds security ownership in workload teams
Centralize services for packages and dependencies
Manual code reviews
Automate testing throughout the development and release lifecycle
Train for application security
Regularly assess security properties of the pipelines
Deploy software programmatically
Perform regular penetration testing