

Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà.

# Risorse
<a name="resources"></a>

## AWS documentazione
<a name="aws-documentation"></a>
+ [AWS Architettura di riferimento per la sicurezza (AWS SRA)](https://docs.aws.amazon.com/prescriptive-guidance/latest/security-reference-architecture/welcome.html)
+ [AWS documentazione sulla sicurezza](https://docs.aws.amazon.com/security/)
+ [Il pilastro della sicurezza del AWS Well-Architected Framework](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html)

## Altre risorse AWS
<a name="other-aws-resources"></a>
+ [AWS Sicurezza nel cloud](https://aws.amazon.com/security/)
+ [AWS Cloud Adoption Framework](https://aws.amazon.com/cloud-adoption-framework/) (prospettiva di sicurezza)

## Risorse dell'Australian Cyber Security Center
<a name="acsc-resources"></a>
+ [Essential Eight spiegato](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-explained)
+ [Modello Essential Eight Maturity](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model)
+ [Guida al processo di valutazione Essential Eight](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide)