

# Resources
<a name="resources-sec"></a>

 **Documentation and blogs **
+  [Securing Modern Connected Vehicle Platforms with AWS IoT](https://aws.amazon.com/blogs/iot/securing-modern-connected-vehicle-platforms-with-aws-iot) 
+  [How to approach threat modeling](https://aws.amazon.com/blogs/security\how-to-approach-threat-modeling) 
+  [Best practices securing Amazon Location Services](https://aws.amazon.com/blogs/security\best-practices-securing-your-amazon-location-service-resources) 
+  [How to detect anomalies in device metrics and improve security posture with AWS IoT Device Defender](https://aws.amazon.com/blogs/iot/how-to-detect-anomalies-in-device-metrics-and-improve-your-security-posture-using-aws-iot-device-defender-custom-metrics/) 
+  [Forensic investigation environment strategies in the AWS cloud](https://aws.amazon.com/blogs/security\forensic-investigation-environment-strategies-in-the-aws-cloud) 

 **AWS Partner solutions **
+  [DataMasque](https://aws.amazon.com/blogs/apn/how-to-mask-sensitive-data-on-aws-using-datamasque/) 
+  [Argus Cyber Security](https://aws.amazon.com/marketplace/seller-profile?id=c18d1099-5095-4d06-aee4-571c7fa75620) 
+  [Recorded Future](https://aws.amazon.com/marketplace/seller-profile?id=0e798044-1f43-48fa-8621-cf2207e7e204) 
+  [Tenable](https://aws.amazon.com/marketplace/seller-profile?id=6d2fe217-0f2b-4853-bf6b-44b37d172a3d) 
+  [Upstream Security](https://aws.amazon.com/marketplace/seller-profile?id=c2e4bab5-137c-4059-86e5-1acbca8bb7ba) 

 **Workshops** 
+  [Automating operations with Playbooks and Runbooks](https://https://catalog.workshops.aws/well-architected-operational-excellence/en-US/2-prepare/10-automating-operations-with-playbooks-and-runbooks/operational-excellence/200_labs/200_automating_operations_with_playbooks_and_runbooks/) 
+  [Incident Response labs](https://catalog.workshops.aws/well-architected-security/en-US/6-incident-response) 
+  [Threat modeling for builders](https://catalog.workshops.aws/threatmodel/en-US) 
+ [Security for Developers](https://catalog.workshops.aws/sec4devs) 