Cloud Business Transformation Security Best Practices
Cloud Business Transformation Security Best Practices
Cloud business
transformation
security best
practices
Table of contents
Introduction................................................................................................................................................................................. 3
Learn more.................................................................................................................................................................................. 16
Notices
This document is provided for informational purposes only. It represents the current product offerings and practices from Amazon Web Services (AWS) as of the date of issue of this document, which are subject to change without notice. Customers
are responsible for making their own independent assessment of the information in this document and any use of AWS products or services, each of which is provided “as is” without warranty of any kind, whether express or implied. This document
does not create any warranties, representations, contractual commitments, conditions, or assurances from AWS, its affiliates, suppliers, or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and
this document is not part of, nor does it modify, any agreement between AWS and its customers.
2
Introduction
Moving to the cloud means making transformational changes to your “AWS is well known for data security and
business processes, services, cost structure, and scale. It also requires disaster recovery, making it easier for us
you to modernize your approach to security. Take the opportunity
to convince insurers that data is securely
to make the move from self-managed, on-premises security and
assurance techniques to a fully managed service architecture that will
stored outside of their data centers.”1
support and scale with your new business transformation architecture.
Roland Chang, Business Development Strategist,
Wesurance
Organizations must meet and achieve thousands of third-party global
validation compliance requirements. AWS helps support organizations
to meet these requirements by sharing the responsibility of security
and compliance while helping them scale in the cloud and automate
security tasks. Evolving toward automated security also helps reduce “We chose AWS because it helps us to meet
human configuration errors and gives teams time to focus on other
data protection standards and provides
work critical to your business.
the scalability we need.”2
1 “Wesurance Drives Transformation for Insurers with Innovative Digital Solutions on AWS,” AWS case study, 2021
2 “Climedo Health Captures Patient-Centric, Compliant, and Secure Clinical Data Using AWS,” AWS case study, 2022
3
Cloud security
in AWS
AWS is architected to be the most flexible
and secure cloud computing environment
available today, giving you the ability to
control your environment so that it meets or
exceeds the control capabilities of your legacy
infrastructure. AWS offers tools and support
for compliance, assurance, and monitoring
of infrastructure and application changes.
It also saves you time by helping you create
guardrails to allow innovation and to ensure
a security baseline without requiring manual
security reviews. All of this helps your security
and IT teams focus more on your core business
and less on security by automating incident
response for anomalies or deviations from
your security baseline.
4
3 benefits of AWS cloud security
1 Build, run, and scale your applications on infrastructure architected to be the most
THE HIGHEST STANDARDS
secure cloud computing environment available today. Benefit from a cloud and network
architecture built to meet the requirements of the most security-sensitive organizations,
including governments, financial services, and healthcare.
The AWS team is
monitoring systems
2 Move fast and stay secure by confidently integrating and automating security into every continuously, 24/7, to
part of your organization. AWS provides organization-wide controls that automate
infrastructure and application security checks to continually enforce security and
help ensure your content
compliance controls. Customers can then implement automated reasoning tools to is constantly protected.
mathematically prove the highest levels of security.
3 Innovate with a wide portfolio of security services and partner solutions to help achieve
end-to-end security for your organization. AWS security services and solutions help
customers implement every step of their organization’s optimal security posture, from
identifying risks to remediation. Customers can extend the benefits of AWS by using
security technology and consulting services from AWS Professional Services and the
AWS Partner Network.
5
Cloud security— When you move your IT infrastructure to AWS, you adopt the model of shared responsibility.
This shared model provides multiple benefits, including reducing your operational burden as
a shared AWS operates, manages, and controls the layers of IT components—from the host operating
system and virtualization layer to the physical security of the facilities in which the services
responsibility operate. Just as you share the responsibility for operating the IT environment with us, you
also share the management, operation, and verification of IT controls.
Customer Data
Software
COMPUTE STORAGE DATABASE NETWORKING
AWS
Responsibility for Hardware/AWS Global Infrastructure
Security “OF” the Cloud
6
AWS—security of the cloud Third-party independent assessments validate the effectiveness and
efficient operations of the ubiquitous AWS IT control environment and
facilities across the globe. These include policies, processes, and control
AWS is responsible for protecting the infrastructure that runs all the activities that use various aspects of the overall AWS control environment.
services offered in AWS. AWS infrastructure is composed of hardware,
software, networking, and facilities that run AWS services. From the host
operating system to the physical security of the facilities, it reduces the Privacy
operational burden for organizations. Gain peace of mind knowing your
Privacy is largely about having control of who can access data. With AWS,
information, identities, applications, and devices are protected.
you know who is accessing your content and what resources your organization
is consuming at any given moment. Provide the right level of access to your
resources at all times. Use fine-grain identity and access controls and
AWS security assurance
continuous monitoring for near real-time security information—regardless
As the leading cloud provider, AWS has comprehensive compliance controls of where your information is stored.
with established, widely recognized frameworks and programs. These
Reduce risk and enable growth by using our activity monitoring services
controls help satisfy compliance requirements for regulatory agencies
that detect configuration changes and security events across your system.
around the world, which you’ll inherit automatically. Not only do they
Integrate our services with your existing solutions to help simplify your
dramatically lower the costs of your security assurance efforts, but they
operations and compliance reporting. AWS gives you control that can help
also strengthen your own compliance and certification programs.
you comply with the regional and local data privacy laws and regulations
applicable to your organization.
COMPLIANCE CONTROL S
AWS supports 143 security and compliance certifications, including:
7
Data residency
AWS data centers are built in clusters in various locations around the
world and are known as AWS Regions. You choose the AWS Regions
in which your customer content is stored. Deploy AWS services in the
locations of your choice in accordance with your specific geographic
requirements and to help you meet your compliance and data residency “With AWS, all sensitive data is segmented,
requirements. For example, if you are an AWS customer in Australia
controlled, and encrypted. Even if we were
who wants to store your data only in Australia, you can choose to
deploy AWS services exclusively in the Asia Pacific (Sydney) AWS
compromised on some level, our architecture
Region. Discover other flexible storage options around the world. is set so that everything is anonymized,
tokenized, and encrypted to prevent
data leaks.”3
Business continuity
Bryan Carroll, Chief Executive Officer and Cofounder, TNEX
AWS infrastructure has a high level of availability and delivers the
features you need to deploy a resilient IT architecture. Our systems
are designed to tolerate system or hardware failures with minimal
customer impact.
Disaster recovery
Remain resilient in the face of most failure modes, including natural
disasters or system failures by distributing applications across multiple
AWS Availability Zones. AWS Elastic Disaster Recovery minimizes
downtime and data loss with fast, reliable recovery of on-premises and
cloud-based applications using affordable storage, minimal compute,
and point-in-time recovery.
3 “TNEX Launches Vietnam’s First Digital Bank in Nine Months on AWS,” AWS case study, 2021
8
Customers—security in How to securely manage your AWS resources
the cloud Your responsibilities will vary depending on the services you use, the
integration of those services with your IT environment, and applicable
laws and regulations. You should take all of this into consideration when
While AWS does the heavy lifting for security of the cloud, customers you choose AWS services. AWS offers different levels of support to help
are responsible for security in the cloud, including managing the guest you raise the security posture of your environment to meet the security
operating system and associated application software. and compliance requirements of your company. Tools and services available
include documented best practices, professional services, and solutions
that automate security and compliance posture checks.
9
Benefits of AWS security and identity services
To help establish security in the cloud, AWS offers a broad selection of innovative
security services to meet your own security and regulatory requirements.
Identity management, AWS provides technical, Network and application AWS detection and Compliance and data
access controls, and operational, and protection services on response services work privacy with AWS gives
governance are contractual measures AWS enable you to enforce together to help you enhance you a comprehensive view
foundational security needed to protect your fine-grained security your security posture and of your compliance status
pillars for organizations data. With AWS, you policies at every network streamline security and continuously monitors
of any size and type. With manage the privacy control point across your operations across your your environment using
AWS, your security and IT controls of your data, organization. AWS network entire AWS environment automated compliance
teams can adopt modern control how your data and application protection by continuously identifying checks based on the
cloud-centric identity is used, who has access to services then provide and prioritizing security AWS best practices and
solutions and Zero Trust it, and how it is encrypted. equally flexible solutions risks, while integrating industry standards your
architectures to securely We underpin these that inspect and filter traffic security practices earlier in organization follows.
support a hybrid workforce, capabilities with the most to prevent unauthorized the development lifecycle.
improve access experiences, flexible and secure cloud resource access.
manage permissions, and computing environment
help meet stringent available today.
compliance mandates.
10
AWS Cloud A successful and secure cloud adoption journey starts with using AWS
experience and best practices in the AWS Cloud Adoption Framework
Adoption (AWS CAF). From a security perspective, the framework provides best
practices for building enhanced security capabilities and resilient
Framework— workloads. The following nine capabilities can help you identify and
prioritize security readiness and achieve the confidentiality, integrity,
a security
and availability of your data and workloads. Common stakeholders
include CISOs, chief commercial officers (CCOs), internal audit leaders,
perspective
and security architects and engineers.
1 Security governance
2 Security assurance
5 Vulnerability management
6 Infrastructure protection
7 Data protection
8 Application security
9 Incident response
11
9 capabilities of the AWS Cloud Adoption Framework—a security perspective (continued)
12
9 capabilities of the AWS Cloud Adoption Framework—a security perspective (continued)
4 hreat detection
T 5 Vulnerability management 6 Infrastructure protection
and monitoring You can have a broad range and a dynamic Control methodologies are critical for successful
set of software and software versions across ongoing operations in the cloud and to meet
Threat detection is necessary to continuously
your server and container workloads. New best practices and regulatory obligations. A key
monitor your environment to identify normal
and legitimate behaviors of the assets and software vulnerabilities are regularly announced— part of an information security program is
vulnerability management is critical to automate infrastructure protection to ensure systems
resources in use. Using techniques such as
machine learning, anomaly detection, automated identifying and prioritizing potential exposures and services within your workload are protected
quickly to enable remediation to occur. against unintended and unauthorized access
best practice checks, and intelligent vulnerability
management of potential misconfiguration, and potential vulnerabilities.
13
9 capabilities of the AWS Cloud Adoption Framework—a security perspective (continued)
14
Creating your AWS AWS Well-Architected Framework
migration strategy
When it comes to building secure, high-performing, resilient, and
efficient infrastructure for a variety of applications and workloads,
the AWS Well-Architected Framework is the go-to source to help
cloud architects focus on the workload level. The security pillar of
Whether you are creating and planning for a successful and
the framework is built around five components:
secure cloud adoption journey or reworking your existing
workloads on AWS, there are several industry-accepted
standards and frameworks to help you build a strong • Identity and access management
security foundation.
• Detection
When it comes to building your IT governance and security
management systems, the AWS Cloud Adoption Framework • Infrastructure protection
helps you plan for a successful and secure cloud migration.
• Data protection
The AWS Well-Architected Framework assists with building
secure infrastructure while automated checks for AWS • Incident response
security best practices allow you to continuously evaluate
AWS accounts from a security perspective.
The AWS Well-Architected Framework provides guidance for secure
implementation and approaches for selecting the right AWS services,
and it helps to implement these core security practices in your workloads.
15
Learn more
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved.
16