# Task Statement 1.3: Determine appropriate data security controls

This study group guide will explore **data security best practices**, focusing on **access control, encryption, data lifecycle management, compliance, and backup strategies**.

Following **SecureCart**, an e-commerce platform, we will implement **strong data security and governance strategies** using AWS services.

***

### **📅 Study Group Agenda**

| **Week**   | **Topic**                                     | **Key AWS Services**                           |
| ---------- | --------------------------------------------- | ---------------------------------------------- |
| **Week 1** | Data Access & Governance                      | IAM, Resource Policies, AWS Organizations      |
| **Week 2** | Data Encryption & Key Management              | AWS KMS, AWS Secrets Manager, AWS ACM          |
| **Week 3** | Data Retention, Classification & Compliance   | Amazon Macie, AWS Config, IAM Policies         |
| **Week 4** | Data Backup, Replication & Recovery           | AWS Backup, RDS Snapshots, S3 Versioning       |
| **Week 5** | Managing Data Lifecycle & Protection Policies | S3 Lifecycle Policies, Glacier, IAM Conditions |
| **Week 6** | Hands-on Labs & Final Challenge               | Implementing End-to-End Data Security          |

### **Final Study Group Summary**

| **Week**   | **Focus Area**                       | **Outcome**                                     |
| ---------- | ------------------------------------ | ----------------------------------------------- |
| **Week 1** | Data Access & Governance             | Implement IAM, SCPs, & Resource Policies        |
| **Week 2** | Encryption & Key Management          | Secure Data Using AWS KMS & ACM                 |
| **Week 3** | Data Classification & Compliance     | Detect Sensitive Data Using Amazon Macie        |
| **Week 4** | Backup & Disaster Recovery           | Automate Backups & Replication Using AWS Backup |
| **Week 5** | Data Lifecycle & Protection Policies | Optimize Data Storage Using S3 Lifecycle        |
| **Week 6** | Hands-on Scenarios                   | Apply All Data Security Best Practices          |
