

# Resources
<a name="resources"></a>

## AWS documentation
<a name="aws-documentation"></a>
+ [AWS Security Reference Architecture (AWS SRA)](https://docs.aws.amazon.com/prescriptive-guidance/latest/security-reference-architecture/welcome.html)
+ [AWS security documentation](https://docs.aws.amazon.com/security/)
+ [Security pillar of the AWS Well-Architected Framework](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html)

## Other AWS resources
<a name="other-aws-resources"></a>
+ [AWS Cloud Security](https://aws.amazon.com/security/)
+ [AWS Cloud Adoption Framework](https://aws.amazon.com/cloud-adoption-framework/) (Security perspective)

## Australian Cyber Security Centre resources
<a name="acsc-resources"></a>
+ [Essential Eight Explained](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-explained)
+ [Essential Eight Maturity Model](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model)
+ [Essential Eight Assessment Process Guide](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide)