NIST CSF use case with identity Unlike the process for building on-premises networks and datacenters that start with physical facilities, computer and storage hardware, and a network perimeter to protect what is being built out, adopting the cloud starts with identity and access management with the chosen cloud service provider. For AWS, this means creating an AWS account and leveraging AWS IAM to create users and groups, define roles, and assign permissions and policies.
Read full article on AWS Security Blog