Select appropriate data security options

Design secure application tiers

Design secure access to AWS resources