ARCHIVED: Amazon Web Services: Overview of Security …

Amazon Web Services:

Overview of Security Processes

d

e

March 2020

v

i

h

This paper has been archived.

For the latest technical content on

Security and Compliance, see



architecture/security-identitycompliance/

c

r

A

Notices

Customers are responsible for making their own independent assessment of the

information in this document. This document: (a) is for informational purposes only, (b)

represents current AWS product offerings and practices, which are subject to change

without notice, and (c) does not create any commitments or assurances from AWS and

its affiliates, suppliers or licensors. AWS products or services are provided ¡°as is¡±

without warranties, representations, or conditions of any kind, whether express or

implied. The responsibilities and liabilities of AWS to its customers are controlled by

AWS agreements, and this document is not part of, nor does it modify, any agreement

between AWS and its customers.

v

i

h

d

e

? 2020 Amazon Web Services, Inc. or its affiliates. All rights reserved.

c

r

A

Contents

Introduction ..........................................................................................................................1

Shared Security Responsibility Model ................................................................................1

AWS Security Responsibilities.........................................................................................2

Customer Security Responsibilities .................................................................................2

AWS Global Infrastructure Security ....................................................................................3

d

e

AWS Compliance Program ..............................................................................................3

Physical and Environmental Security ..............................................................................4

Business Continuity Management ...................................................................................6

v

i

h

Network Security ..............................................................................................................7

AWS Access ...................................................................................................................11

Secure Design Principles ...............................................................................................12

Change Management.....................................................................................................12

c

r

A

AWS Account Security Features ...................................................................................14

Individual User Accounts ...............................................................................................19

Secure HTTPS Access Points .......................................................................................19

Security Logs..................................................................................................................20

AWS Trusted Advisor Security Checks .........................................................................20

AWS Config Security Checks ........................................................................................21

AWS Service-Specific Security .........................................................................................21

Compute Services ..........................................................................................................21

Networking Services ......................................................................................................28

Storage Services ............................................................................................................43

Database Services .........................................................................................................55

Application Services .......................................................................................................66

Analytics Services ..........................................................................................................73

Deployment and Management Services .......................................................................77

Mobile Services ..............................................................................................................82

Applications ....................................................................................................................85

Document Revisions..........................................................................................................88

c

r

A

v

i

h

d

e

Abstract

This document is intended to answer questions, such as How does AWS help me

ensure that my data is secure? Specifically, this paper describes AWS physical and

operational security processes for the network and server infrastructure under the

management of AWS.

c

r

A

v

i

h

d

e

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download