Platform Security Best Practices
General
We support a number of security best practices to ensure that your Cado Response deployment is secure in AWS deployments. Data is encrypted, and access to the Cado Response platform is controlled using IAM roles and policies, and network access.
Additional Resources
Please refer to the following documentation for specific advice: