7 Step Process to Secure AWS and Custom Applications