ARCHIVED: Amazon Web Services: Overview of Security …
Amazon Web Services:
Overview of Security Processes
d
e
March 2020
v
i
h
This paper has been archived.
For the latest technical content on
Security and Compliance, see
architecture/security-identitycompliance/
c
r
A
Notices
Customers are responsible for making their own independent assessment of the
information in this document. This document: (a) is for informational purposes only, (b)
represents current AWS product offerings and practices, which are subject to change
without notice, and (c) does not create any commitments or assurances from AWS and
its affiliates, suppliers or licensors. AWS products or services are provided ¡°as is¡±
without warranties, representations, or conditions of any kind, whether express or
implied. The responsibilities and liabilities of AWS to its customers are controlled by
AWS agreements, and this document is not part of, nor does it modify, any agreement
between AWS and its customers.
v
i
h
d
e
? 2020 Amazon Web Services, Inc. or its affiliates. All rights reserved.
c
r
A
Contents
Introduction ..........................................................................................................................1
Shared Security Responsibility Model ................................................................................1
AWS Security Responsibilities.........................................................................................2
Customer Security Responsibilities .................................................................................2
AWS Global Infrastructure Security ....................................................................................3
d
e
AWS Compliance Program ..............................................................................................3
Physical and Environmental Security ..............................................................................4
Business Continuity Management ...................................................................................6
v
i
h
Network Security ..............................................................................................................7
AWS Access ...................................................................................................................11
Secure Design Principles ...............................................................................................12
Change Management.....................................................................................................12
c
r
A
AWS Account Security Features ...................................................................................14
Individual User Accounts ...............................................................................................19
Secure HTTPS Access Points .......................................................................................19
Security Logs..................................................................................................................20
AWS Trusted Advisor Security Checks .........................................................................20
AWS Config Security Checks ........................................................................................21
AWS Service-Specific Security .........................................................................................21
Compute Services ..........................................................................................................21
Networking Services ......................................................................................................28
Storage Services ............................................................................................................43
Database Services .........................................................................................................55
Application Services .......................................................................................................66
Analytics Services ..........................................................................................................73
Deployment and Management Services .......................................................................77
Mobile Services ..............................................................................................................82
Applications ....................................................................................................................85
Document Revisions..........................................................................................................88
c
r
A
v
i
h
d
e
Abstract
This document is intended to answer questions, such as How does AWS help me
ensure that my data is secure? Specifically, this paper describes AWS physical and
operational security processes for the network and server infrastructure under the
management of AWS.
c
r
A
v
i
h
d
e
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- in the uk amazon announced that it is creating more than
- benefits enrollment guide
- a sample research paper thesis dissertation on
- archived amazon web services overview of security
- uniforms
- molina healthcare employee handbook
- us about amazon
- employment law overview poland l e global knowledge
- informatica cloud workday connector
- standards of business conduct
Related searches
- amazon web services revenue
- amazon web services revenue 2018
- amazon web services profitability 2018
- amazon web services revenue history
- amazon web services financials
- amazon web services annual report
- amazon web services revenue 2019
- amazon web services strategic plan
- amazon web services cloud
- amazon web services growth
- amazon web services history
- amazon web services cloud platform