Threat detection and response This page outlines strategies to detect threats and how to respond. References AWS Well Architected - Investigate