System+and+Organization+Controls+ (SOC) +1+report+ +current
System+and+Organization+Controls+ (SOC) +1+report+ +current
DOCUMENT STRUCTURE
The requested document is appended to this terms and conditions page. This document
contains supplementary attachments. To access the supplementary attachments, you must open
A7
this document in an application that supports PDF attachments. See the AWS Artifact User Guide
for instructions on how to open attachments.
7
TERMS AND CONDITIONS
g1
You hereby agree that you will not distribute, display, or otherwise make this document available
to an individual or entity, unless expressly permitted herein. This document is AWS Confidential
Information (as defined in the AWS Customer Agreement), and you may not remove these terms
Rw
and conditions from this document, nor take excerpts of this document, without Amazon’s
express written consent. You may not use this document for purposes competitive with Amazon.
You may distribute this document, in its complete form, upon the commercially reasonable
request by (1) an end user of your service, to the extent that your service functions on relevant
ab
AWS offerings provided that such distribution is accompanied by documentation that details the
function of AWS offerings in your service, provided that you have entered into a confidentiality
gv
agreement with the end user that includes terms not less restrictive than those provided herein
and have named Amazon as an intended beneficiary, or (2) a regulator, so long as you request
confidential treatment of this document (each (1) and (2) is deemed a “Permitted Recipient”).
e9
You must keep comprehensive records of all Permitted Recipient requests, and make such records
available to Amazon and its auditors, upon request. You further (i) acknowledge and agree that
you do not acquire any rights against Amazon’s Service Auditors in connection with your receipt
m
or use of this document, and (ii) release Amazon’s Service Auditor from any and all claims or
causes of action that you have now or in the future against Amazon’s Service Auditor arising from
kc
this document. The foregoing sentence is meant for the benefit of Amazon’s Service Auditors,
who are entitled to enforce it. “Service Auditor” means the party that created this document for
I6
g1
Table of Contents
Rw
SECTION I – Assertion of Amazon Web Services ....................................................................................... 3
SECTION II – Independent Service Auditor’s Assurance Report .............................................................. 11
ab
SECTION III – Description of the Amazon Web Services System .............................................................. 20
Amazon Web Services System Overview ........................................................................................... 21
A. Policies................................................................................................................................... 28
gv
B. Communications .................................................................................................................... 32
C. Service Commitments and System Requirements ................................................................... 32
e9
D. Procedures ............................................................................................................................. 34
E. Monitoring ............................................................................................................................. 84
m
SECTION IV – Description of Control Objectives, Controls, Tests, and Results of Tests ............................ 89
Testing Performed and Results of Entity-Level Controls ..................................................................... 90
I6
Procedures for Assessing Completeness and Accuracy of Information Provided by the Entity (IPE) .... 90
EK
Gw
Seattle, WA 98109-5210
A7
We have prepared the description of Amazon Web Services, Inc.’s (AWS) system entitled, “Description of
the Amazon Web Services System” (Description) for providing cloud computing services throughout the
period July 1, 2023 to June 30, 2024 for user entities of the system during some or all of the period July 1,
7
2023 to June 30, 2024, and their auditors who audit and report on such user entities’ financial statements
g1
or internal control over financial reporting and have a sufficient understanding to consider the
Description, along with other information, including information about controls implemented by user
entities of the system themselves, when assessing the risks of material misstatements of user entities’
Rw
financial statements.
ab
• Amazon AppFlow • AWS App Mesh
• Amazon AppStream 2.0 • AWS App Runner
• Amazon Athena • AWS AppFabric
gv
• Amazon Augmented AI [Excludes Public • AWS Application Migration Service
Workforce and Vendor Workforce for all • AWS AppSync
•
features]
e9 AWS Artifact
• Amazon Bedrock • AWS Audit Manager
• Amazon Braket • AWS Backup
m
• Amazon Chime • AWS Batch
• Amazon Chime SDK • AWS Certificate Manager (ACM)
•
kc
AWS CodeBuild
• Amazon Comprehend Medical • AWS CodeCommit
• Amazon Connect • AWS CodeDeploy
n-
Gw
Seattle, WA 98109-5210
A7
• Amazon Elastic Container Service [both • AWS Elemental MediaLive
Fargate and EC2 launch types] • AWS Entity Resolution
• Amazon Elastic File System (EFS) • AWS Fault Injection Service
7
• Amazon Elastic Kubernetes Service (EKS) • AWS Firewall Manager
g1
[both Fargate and EC2 launch types] • AWS Global Accelerator
• Amazon Elastic MapReduce (EMR) • AWS Glue
• Amazon ElastiCache • AWS Glue DataBrew
Rw
• Amazon EventBridge • AWS Health Dashboard
• Amazon FinSpace • AWS HealthImaging
• Amazon Forecast • AWS HealthLake
• Amazon Fraud Detector • AWS HealthOmics
ab
• Amazon FSx • AWS IAM Identity Center
• Amazon GuardDuty • AWS Identity and Access Management
• Amazon Inspector (IAM)
gv
• Amazon Inspector Classic • AWS IoT Core
• Amazon Kendra • AWS IoT Device Defender
• •
Amazon Keyspaces (for Apache Cassandra)
e9 AWS IoT Device Management
• Amazon Kinesis Data Streams • AWS IoT Events
• Amazon Kinesis Video Streams • AWS IoT Greengrass
m
• Amazon Lex • AWS IoT SiteWise
• Amazon Location Service • AWS IoT TwinMaker
• •
kc
Puppet Enterprise]
Amazon MemoryDB for Redis) • AWS OpsWorks Stacks
• Amazon MQ • AWS Organizations
n-
Gw
Seattle, WA 98109-5210
A7
• Amazon SageMaker [Excludes Studio Lab, • AWS Shield
Public Workforce and Vendor Workforce • AWS Signer
for all features] • AWS Snowball
7
• Amazon Simple Email Service (SES) • AWS Snowball Edge
g1
• Amazon Simple Notification Service (SNS) • AWS Snowmobile
• Amazon Simple Queue Service (SQS) • AWS Step Functions
• Amazon Simple Storage Service (S3) • AWS Storage Gateway
Rw
• Amazon Simple Workflow Service (SWF) • AWS Systems Manager
• Amazon SimpleDB • AWS Transfer Family
• Amazon Textract • AWS User Notifications
• Amazon Timestream • AWS WAF
ab
• Amazon Transcribe • AWS Wickr
• Amazon Translate • AWS X-Ray
• Amazon Virtual Private Cloud (VPC) • EC2 Image Builder
gv
• Amazon WorkDocs • Elastic Load Balancing (ELB)
• Amazon WorkMail • FreeRTOS
• •
Amazon WorkSpaces
e9
VM Import/Export
• Amazon WorkSpaces Secure Browser
(Formerly known as Amazon Workspaces
m
Web)
kc
More information about the in-scope services, can be found at the following web address:
I6
https://aws.amazon.com/compliance/services-in-scope/
EK
The scope of locations covered in this report includes the supporting data centers located in the following
regions:
southeast-4)
• Bahrain: Middle East (Bahrain) (me-south-1)
n-
Gw
Seattle, WA 98109-5210
A7
• Singapore: Asia Pacific (Singapore) (ap-southeast-1)
• South Africa: Africa (Cape Town) (af-south-1)
• South Korea: Asia Pacific (Seoul) (ap-northeast-2)
7
• Spain: Europe (Spain) (eu-south-2)
g1
• Sweden: Europe (Stockholm) (eu-north-1)
• Switzerland: Europe (Zurich) (eu-central-2)
• United Arab Emirates: Middle East (UAE) (me-central-1)
Rw
• United States: US East (Northern Virginia) (us-east-1), US East (Ohio) (us-east-2), US
West (Oregon) (us-west-2), US West (Northern California) (us-west-1), AWS GovCloud
(US-East) (us-gov-east-1), AWS GovCloud (US-West) (us-gov-west-1)
ab
* Effective date for this region is February 15, 2024.
gv
and the following AWS Edge locations in:
Gw
Seattle, WA 98109-5210
A7
• Aubervilliers, France • Anyang-si, South Korea States
• Marseille, France • Seoul, South Korea • Palo Alto, United States
• • • Philadelphia, United States
7
Paris, France Barcelona, Spain
• Berlin, Germany • Madrid, Spain • Phoenix, United States
g1
• Dusseldorf, Germany • Stockholm, Sweden • Piscataway, United States
• Frankfurt, Germany • Zurich, Switzerland • Pittsburgh, United States
• • •
Rw
Hamburg, Germany New Taipei City, Taiwan Portland, United States
• Munich, Germany • Taipei, Taiwan • Reston, United States
• Kropia, Greece • Bangkok, Thailand • Richardson, United States
• Budapest, Hungary • Bang Chalong, Thailand • San Jose, United States
ab
• Bangalore, India • Dubai, United Arab • Seattle, United States
• Chennai, India Emirates • Secaucus, United States
• • •
gv
Hyderabad, India Fujairah, United Arab Tampa, United States
• Kolkata, India Emirates • Tempe, United States
• Mumbai, India • London, United Kingdom • Vienna, United States
e9
• New Delhi, India • Manchester, United • West Valley City, United
• Noida, India Kingdom States
• Pune, India • Slough, United Kingdom • Hanoi, Vietnam
m
London, United Kingdom Knoxville, United States Wall Township, United States
• Salford, United Kingdom • Las Vegas, United States • Westborough, United States
-to
mr
te
Gw
Seattle, WA 98109-5210
A7
• Buenos Aires, Argentina • Manila, Philippines • Irvine, United State
• Perth, Australia • Warsaw, Poland • Itasca, United States
• Santiago, Chile • Singapore, Singapore* • Kansas City, United States
7
• Copenhagen, Denmark • Taipei, Taiwan • Las Vegas, United States
• • •
g1
Helsinki, Finland Bangkok, Thailand Lee's Summit, United States*
• Hamburg, Germany • Atlanta, United States • Lithia Springs, United States
• Kolkata, India • Boston, United States • Mesa, United States
Rw
• New Delhi, India • Chicago, United States • Miami, United States
• Noida, India* • El Segundo, United States • Minneapolis, United States
• Queretaro, Mexico • Garland, United States • Philadelphia, United States
• Rosedale, New Zealand • Greenwood Village, • Phoenix, United States
ab
• Lagos, Nigeria United States • Piscataway, United States
• Muscat, Oman • Hillsboro, United States • Richardson, United States
gv
• Lima, Peru • Houston, United States • Seattle, United States
* This location is a Dedicated Local Zone and may not be available to all customers.
e9
The Description indicates that certain control objectives specified in the Description can be achieved only
m
if complementary user entity controls assumed in the design of AWS’ controls are suitably designed and
operating effectively, along with related controls at the service organization. The Description does not
extend to controls of the user entities.
kc
a. The Description fairly presents the Amazon Web Services system (System) made available to user
entities of the System during some or all of the period July 1, 2023 to June 30, 2024, for providing
EK
cloud computing services as it relates to controls that are likely relevant to user entities’ internal
control over financial reporting. The criteria we used in making this assertion were that the
Description:
zz
(1) Presents how the System made available to user entities of the system was designed and
implemented, including, if applicable:
n-
• The procedures, within both automated and manual systems, by which those services are
provided for user entities of the System.
-to
• The information used in the performance of the procedures and supporting information;
this includes the correction of incorrect information and how information is transferred
to the reports prepared for user entities.
m
• How the System captures and addresses significant events and conditions.
• The process used to prepare reports and other information for user entities.
r
te
Gw
Seattle, WA 98109-5210
A7
• The specified control objectives and controls designed to achieve those objectives,
including, as applicable, complementary user entity controls assumed in the design of the
service organization’s controls.
7
• Other aspects of our control environment, risk assessment process, information, and
g1
communications (including the related business processes), control activities, and
monitoring activities that are relevant to the services provided.
Rw
(2) Includes relevant details of changes to the System during the period covered by the
Description.
ab
(3) Does not omit or distort information relevant to the System, while acknowledging that the
Description is prepared to meet the common needs of a broad range of user entities of the
System and their user auditors, and may not, therefore, include every aspect of the System
gv
that each individual user entity of the System and its user auditor may consider important in
the user entity’s own particular environment.
e9
b. The controls related to the control objectives stated in the Description were suitably designed
and operated effectively throughout the period July 1, 2023 to June 30, 2024, to achieve those
control objectives, if user entities applied the complementary user entity controls assumed in the
m
design of AWS’ controls throughout the period July 1, 2023 to June 30, 2024. The criteria we used
in making this assertion were that:
kc
(1) The risks that threaten the achievement of the control objectives stated in the Description
have been identified by management of the service organization.
I6
(2) The controls identified in the Description would, if operating effectively, provide reasonable
assurance that those risks would not prevent the control objectives stated in the Description
EK
Gw
Amazon Web Services System Overview
A7
Since 2006, Amazon Web Services (AWS) has provided flexible, scalable and secure IT infrastructure to
businesses of all sizes around the world. With AWS, customers can deploy solutions in a cloud computing
environment that provides compute power, storage, and other application services over the Internet as
their business needs demand. AWS affords businesses the flexibility to employ the operating systems,
7
application programs, and databases of their choice.
g1
The scope of this system description includes the following services:
Rw
• Amazon API Gateway • AWS Amplify
• Amazon AppFlow • AWS App Mesh
• Amazon AppStream 2.0 • AWS App Runner
• Amazon Athena • AWS AppFabric
ab
• Amazon Augmented AI [Excludes Public • AWS Application Migration Service
Workforce and Vendor Workforce for all • AWS AppSync
•
gv
features] AWS Artifact
• Amazon Bedrock • AWS Audit Manager
• Amazon Braket • AWS Backup
•
e9
Amazon Chime • AWS Batch
• Amazon Chime SDK • AWS Certificate Manager (ACM)
• Amazon Cloud Directory • AWS Chatbot
m
Gw
• Amazon Elastic Container Service [both • AWS Elemental MediaLive
Fargate and EC2 launch types] • AWS Entity Resolution
•
A7
Amazon Elastic File System (EFS) • AWS Fault Injection Service
• Amazon Elastic Kubernetes Service (EKS) • AWS Firewall Manager
[both Fargate and EC2 launch types] • AWS Global Accelerator
• •
7
Amazon Elastic MapReduce (EMR) AWS Glue
• Amazon ElastiCache • AWS Glue DataBrew
g1
• Amazon EventBridge • AWS Health Dashboard
• Amazon FinSpace • AWS HealthImaging
• Amazon Forecast • AWS HealthLake
Rw
• Amazon Fraud Detector • AWS HealthOmics
• Amazon FSx • AWS IAM Identity Center
• Amazon GuardDuty • AWS Identity and Access Management
•
ab
Amazon Inspector (IAM)
• Amazon Inspector Classic • AWS IoT Core
• Amazon Kendra • AWS IoT Device Defender
gv
• Amazon Keyspaces (for Apache Cassandra) • AWS IoT Device Management
• Amazon Kinesis Data Streams • AWS IoT Events
• Amazon Kinesis Video Streams • AWS IoT Greengrass
e9
• Amazon Lex • AWS IoT SiteWise
• Amazon Location Service • AWS IoT TwinMaker
• Amazon Macie • AWS Key Management Service (KMS)
m
Gw
• Amazon SageMaker [Excludes Studio Lab, • AWS Shield
Public Workforce and Vendor Workforce • AWS Signer
A7
for all features] • AWS Snowball
• Amazon Simple Email Service (SES) • AWS Snowball Edge
• Amazon Simple Notification Service (SNS) • AWS Snowmobile
• •
7
Amazon Simple Queue Service (SQS) AWS Step Functions
• Amazon Simple Storage Service (S3) • AWS Storage Gateway
g1
• Amazon Simple Workflow Service (SWF) • AWS Systems Manager
• Amazon SimpleDB • AWS Transfer Family
• Amazon Textract • AWS User Notifications
Rw
• Amazon Timestream • AWS WAF
• Amazon Transcribe • AWS Wickr
• Amazon Translate • AWS X-Ray
•
ab
Amazon Virtual Private Cloud (VPC) • EC2 Image Builder
• Amazon WorkDocs • Elastic Load Balancing (ELB)
• Amazon WorkMail • FreeRTOS
gv
• Amazon WorkSpaces • VM Import/Export
• Amazon WorkSpaces Secure Browser
(Formerly known as Amazon Workspaces
e9
Web)
m
More information about the in-scope services, can be found at the following web address:
https://aws.amazon.com/compliance/services-in-scope/
kc
The scope of locations covered in this report includes the supporting data centers located in the following
regions:
I6
southeast-4)
• Bahrain: Middle East (Bahrain) (me-south-1)
• Brazil: South America (São Paulo) (sa-east-1)
• Canada: Canada (Central) (ca-central-1), Canada West (Calgary) (ca-west-1)*
zz
Gw
• South Africa: Africa (Cape Town) (af-south-1)
• South Korea: Asia Pacific (Seoul) (ap-northeast-2)
A7
• Spain: Europe (Spain) (eu-south-2)
• Sweden: Europe (Stockholm) (eu-north-1)
• Switzerland: Europe (Zurich) (eu-central-2)
7
• United Arab Emirates: Middle East (UAE) (me-central-1)
• United States: US East (Northern Virginia) (us-east-1), US East (Ohio) (us-east-2), US West
g1
(Oregon) (us-west-2), US West (Northern California) (us-west-1), AWS GovCloud (US-East)
(us-gov-east-1), AWS GovCloud (US-West) (us-gov-west-1)
Rw
* Effective date for this region is February 15, 2024.
ab
• Caba, Argentina • Dublin, Ireland • Bluffdale, United States
• General Pacheco, • Haifa, Israel • Boston, United States
• •
gv
Argentina Milan, Italy Chandler, United States
• Brisbane, Australia • Rome, Italy • Chicago, United States
• Canberra, Australia • Inzai, Japan • Columbus, United States
e9
• Hume, Australia • Koto City, Japan • Dallas, United States
• Melbourne, Australia • Osaka, Japan • Denver, United States
• Perth, Australia • Shinagawa, Japan • El Segundo, United States
m
Gw
• Berlin, Germany • Madrid, Spain • Phoenix, United States
• Dusseldorf, Germany • Stockholm, Sweden • Piscataway, United States
A7
• Frankfurt, Germany • Zurich, Switzerland • Pittsburgh, United States
• Hamburg, Germany • New Taipei City, Taiwan • Portland, United States
• Munich, Germany • Taipei, Taiwan • Reston, United States
• • •
7
Kropia, Greece Bangkok, Thailand Richardson, United States
• Budapest, Hungary • Bang Chalong, Thailand • San Jose, United States
g1
• Bangalore, India • Dubai, United Arab • Seattle, United States
• Chennai, India Emirates • Secaucus, United States
• Hyderabad, India • Fujairah, United Arab • Tampa, United States
Rw
• Kolkata, India Emirates • Tempe, United States
• Mumbai, India • London, United Kingdom • Vienna, United States
• New Delhi, India • Manchester, United • West Valley City, United
ab
• Noida, India Kingdom States
• Pune, India • Slough, United Kingdom • Hanoi, Vietnam
• Bekasi, Indonesia • Swinton, United Kingdom • Ho Chi Minh, Vietnam
gv
• Jakarta, Indonesia • Ashburn, United States
• Clonshaugh, Ireland • Atlanta, United States
e9
and the following Wavelength locations in:
• • •
m
Toronto, Canada Alpharetta, United States Minneapolis, United States
• Berlin, Germany • Annapolis Junction, United • New Berlin, United States
• •
kc
Gw
• Noida, India* • El Segundo, United States • Minneapolis, United States
• Queretaro, Mexico • Garland, United States • Philadelphia, United States
A7
• Rosedale, New Zealand • Greenwood Village, • Phoenix, United States
• Lagos, Nigeria United States • Piscataway, United States
• Muscat, Oman • Hillsboro, United States • Richardson, United States
7
• Lima, Peru • Houston, United States • Seattle, United States
g1
* This location is a Dedicated Local Zone and may not be available to all customers.
Rw
Moving the customer’s IT infrastructure to AWS builds a shared responsibility model between customers
and AWS. AWS operates, manages, and controls the components from the host operating system and
virtualization layer down to the physical security of the facilities in which the services operate. In turn,
ab
customers assume responsibility and management of the design, implementation and operation of their
AWS environment, which may include guest operating systems (including updates and security patches),
other associated application software, as well as the configuration of the AWS-provided security group
gv
firewall. Customers should carefully consider the services they choose as customer responsibilities vary
depending on the services they use, the integration of those services into their IT environments, and
applicable laws and regulations. It is possible to enhance security and/or meet more stringent compliance
e9
requirements by leveraging technology such as host-based firewalls, host-based intrusion
detection/prevention, and encryption. AWS provides tools and information to assist customers in their
efforts to account for and to validate that controls are operating effectively in their extended IT
m
AWS offers a variety of different infrastructure and platform services. More information can be found on
the AWS Shared Responsibility Model at https://aws.amazon.com/compliance/shared-responsibility-
I6
model/. For the purpose of understanding security and shared responsibility for AWS’ services, AWS has
categorized them into three main categories: infrastructure, container, and abstracted. Each category
EK
comes with a slightly different security ownership model based on how customers interact and access the
functionality. Customer responsibility is determined by the AWS Cloud services that a customer selects.
This determines the amount of configuration work the customer must perform as part of their security
responsibilities.
zz
Infrastructure Services: Services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon
n-
Virtual Private Cloud (Amazon VPC) are categorized as Infrastructure Services and, as such, require the
customer to perform the necessary security configuration and management tasks. If a customer deploys
an Amazon EC2 instance, they are responsible for management of the guest operating system (including
ke
updates and security patches), any application software or utilities installed by the customer on the
instances, and the configuration of the AWS-provided firewall (called a security group) on each instance.
-to
Container Services: Services in this category typically run separately on Amazon EC2 or other
infrastructure instances, but sometimes customers are not required to manage the operating system or
the platform layer. AWS provides a managed service for these application “containers”. Customers are
m
responsible for setting up and managing network controls, such as firewall rules, and for managing
r
Gw
platform-level identity and access management separately from IAM. Examples of container services
include Amazon Relational Database Services (Amazon RDS), Amazon Elastic Map Reduce (Amazon EMR)
A7
and AWS Elastic Beanstalk.
Abstracted Services: This category includes high-level storage, database, and messaging services, such as
Amazon Simple Storage Service (Amazon S3), Amazon Glacier, Amazon DynamoDB, Amazon Simple
7
Queuing Service (Amazon SQS), and Amazon Simple Email Service (Amazon SES). These services abstract
g1
the platform or management layer on which the customers can build and operate cloud applications. The
customers access the endpoints of these abstracted services using AWS APIs, and AWS manages the
underlying service components or the operating system on which they reside.
Rw
As every customer deploys their environment differently in AWS, customers can take advantage of shifting
the management of certain IT controls to AWS, which results in a (new) distributed control environment.
Customers can then use the AWS control and compliance documentation available to them to perform
ab
their control evaluation and verification procedures as required. Certain functions of services have been
identified as controls in the system description and are denoted as “service-specific” as they are unique
to the respective service.
gv
More information and examples on the AWS Security Best Practices can be found at
https://aws.amazon.com/architecture/security-identity-compliance/.
e9
Furthermore, AWS publishes security blogs related to best practices that cover best practices around using
AWS services at https://aws.amazon.com/blogs/security/tag/best-practices/.
m
AWS offers a variety of services, and customers have the flexibility to architect AWS services to meet the
varying needs of their computing and storage requirements, including the hosting of financial applications.
I6
Customers specifically using one or more of the AWS services within the scope of this report (outlined
above under the Amazon Web Services System Overview) to support their financial applications may use
EK
this report to support their understanding of the design and operating effectiveness of the AWS control
environment as assessed by the Independent Service Auditor’s Assurance Report for financial reporting
purposes.
zz
As defined by the American Institute of Certified Public Accountants (AICPA), internal control is a process
affected by an entity’s board of directors, management, and other personnel and consists of five
ke
interrelated components:
• Control Environment – Sets the tone of an organization, influencing the control consciousness of
-to
its people. It is the foundation for all other components of internal control, providing discipline
and structure.
• Risk Assessment – The entity’s identification and analysis of relevant risks to the achievement of
m
its objectives, forming a basis for determining how the risks should be managed.
r
Gw
• Information and Communication – Surrounding these activities are information and
communication systems. These enable the entity’s people to capture and exchange information
A7
needed to conduct and control its operations.
• Monitoring – The entire process must be monitored, and modifications made as necessary. In this
way, the system can react dynamically, changing as conditions warrant.
7
• Control Activities – Control policies and procedures must be established and executed to help
g1
ensure that the actions identified by management as necessary to address risks to the
achievement of the entity’s objectives are effectively carried out.
Rw
This section briefly describes the essential characteristics and other interrelated components of internal
controls in achieving the control objectives as they pertain to AWS that may be relevant to customers in
five broad areas:
ab
• Policies (Control Environment and Risk Management) – The entity has defined and documented
its policies relevant to the particular principles.
gv
• Communications (Information and Communication) – The entity has communicated its defined
policies to responsible parties and authorized users of the system.
• Service Commitments and System Requirements (Control Activities) – The entity has
e9
communicated its service commitments and system requirements to customers in accordance
with customer agreements.
m
• Procedures (Control Activities) – The entity has placed in operation procedures to achieve service
commitments and systems requirements in accordance with its defined policies.
kc
• Monitoring – The entity monitors the system and takes action to maintain compliance with its
defined policies.
I6
A. Policies
EK
AWS is a unit within Amazon.com (“Amazon” or “the Company”) that is aligned organizationally around
zz
each of the web services, such as Amazon EC2, Amazon S3, Amazon VPC, Amazon EBS and Amazon RDS.
AWS leverages some aspects of Amazon’s overall control environment in the delivery of these web
services. The collective control environment encompasses management and employee efforts to establish
n-
and maintain an environment that supports the effectiveness of specific controls. AWS maintains internal
informational websites describing the AWS environment, its boundaries, user responsibilities and services
ke
(Control AWSCA-9.1).
The control environment at Amazon begins at the highest level of the Company. Executive and senior
-to
leadership play important roles in establishing the Company’s core values and tone at the top. The
Company’s Code of Business Conduct and Ethics, which sets guiding principles, is made available to every
employee.
mr
Gw
Amazon is committed to having the highest qualified members as a part of its Board of Directors (Control
AWSCA-1.7). Annually, the Amazon Corporate Governance Committee provides each Board member a
A7
questionnaire that establishes whether they are independent and qualified to serve on each Board or
Committee under the applicable rules. The Corporate Governance Committee periodically reviews and
assesses the composition of the Board and evaluates the overall Board performance during the annual
assessment of individual Board members. The Leadership Development and Compensation Committee,
7
with the full Board present, annually evaluates the succession plan for each member of the Senior
g1
Management team (Control AWSCA-1.8). This includes the annual Company and CEO performance and
succession plan.
Rw
AWS is committed to protecting its customers’ data and maintaining compliance with applicable
regulatory requirements. This is demonstrated by the consolidated annual operational plan that includes
regulatory and compliance requirements and objectives to enable the identification and assessment of
risks relating to those objectives (Control AWSCA-1.9). AWS’ policies and procedures outline the required
ab
guidance for operation and information security that supports AWS environments, acceptable use of
mobile devices, and access to data content and network devices (Control AWSCA-3.16). All AWS
employees are required to review all applicable policies and procedures, as updated from time to time.
gv
Evidence of compliance with the training on AWS policies is executed and retained by the employee
resource team. e9
Amazon has setup an ethics hotline for the employees or third-party contractors to report any misconduct
or violation of AWS policies, practices, rules, requirements or procedures (Control AWSCA-9.6). Any
material violation of the Company Code of Business Conduct and Ethics or any other similar policies are
m
appropriately handled accordingly which may include disciplinary action or termination of employment.
Violations by vendors or third-party contractors are reported to their employers for disciplinary action,
kc
AWS Management has implemented a formal audit program that monitors and audits controls that are
I6
designed to protect against organizational risks and customer content. This includes external independent
assessments against regulatory, internal and external control frameworks. The internal and external
EK
audits are planned, performed and reported to the Audit Committee. The AWS compliance team performs
and reviews the audit plan according to the documented audit schedule and communicates the audit
requirements based on standard criteria that verifies compliance with the regulatory requirements and
zz
AWS Artifact is the primary resource for customers to obtain compliance-related information from AWS.
n-
It provides access to AWS’ security and compliance reports and select online agreements. Reports
available in AWS Artifact include: AWS Service System and Organization Controls (SOC) reports, Payment
ke
Card Industry (PCI) Attestation of Compliance, and certifications from accreditation bodies across
geographies and industry verticals that validate the implementation and operating effectiveness of AWS
security controls. Amongst other things, compliance reports are made available to customers to enable
-to
them to evaluate AWS’ conformance with security controls and associated compliance obligations
(Control AWSCA-9.8).
m
The AWS organizational structure provides a framework for planning, executing and controlling business
operations (Control AWSCA-1.1). The organizational structure assigns roles and responsibilities to provide
r
Gw
for adequate staffing, efficiency of operations and the segregation of duties. Management has also
established authority and appropriate lines of reporting for key personnel. The Company follows a
A7
structured on-boarding process to assist new employees as they become familiar with Amazon tools,
processes, systems, policies and procedures.
AWS performs a formal evaluation of the appropriate resourcing and staffing to align employee
7
qualifications with the entity’s business objectives to support the achievement of the entity’s business
g1
objectives. Appropriate feedback is given to the employee on strengths and growth areas during the
annual performance review process. Employee strength and growth evaluations are shared by the
employee’s manager with the employee (Control AWSCA-9.3).
Rw
The GovCloud (US East) and GovCloud (US West) environments are AWS regions located in the United
States (US) that are designed to maintain physical and logical access controls that limit access by AWS
personnel to the AWS Network for the GovCloud (US) regions to US citizens. The AWS control environment
ab
described in this document is also applicable to the GovCloud (US) regions. The AWS control environment
is subject to various internal and external risk assessments.
gv
AWS has established an information security framework and regularly reviews and updates the security
policies, provides security training, which includes data classification, to employees, and performs
application security reviews. These reviews assess the availability, confidentiality, and integrity of data, as
e9
well as conformance to the security policies. Where necessary, AWS Security leverages the security
framework and security policies established and maintained by Amazon Corporate Information Security.
m
AWS has a process in place to review environmental and geo-political risks before launching a new region
(Control AWSCA-1.10). Risk assessments encompass reviews of natural catastrophe (e.g., extreme
kc
weather events), technological (e.g., fire, nuclear radiation, industrial pollution) and man-made (e.g.,
vehicle impact, intentional acts, geo-political) hazards, including exposures presented by nearby entities;
as applicable. In addition to site-specific considerations, AWS evaluates scenarios potentially affecting
I6
AWS maintains a formal risk management program to identify, analyze, treat, and continuously monitor
zz
and report risks that affect AWS’ business objectives, regulatory requirements, and customers. The AWS
Risk Management (ARM) program identifies risks, documents them in a risk register, and reports results
to leadership at least semi-annually. The risk management program consists of the following phases:
n-
1) Identifying Risks
ke
ARM has developed a tailored approach to identifying risks across the business. The approach is:
• Bottom-up to identify existing risk management activities
-to
Gw
Where appropriate, ARM conducts ad-hoc engagements with the business prompted by inbound
requests or proactive outreach by the team on specific questions.
A7
2) Analyzing Risks
ARM reviews the identified risks with senior leaders to calibrate, assess, and prioritize. This is
accomplished by evaluating:
7
• Probability (likelihood of occurrence in a defined time period);
g1
• Impact (degree of severity in terms of customers, employees, cost, operations, legal and
regulatory compliance, and reputation); and
Rw
• Current Risk Management Effectiveness (existence of practices or controls that reduce
inherent risk).
3) Treating Risks
ab
ARM adopts risk treatment (versus risk mitigation) as a strategy, collaborating with business SMEs
to develop response plans based on the appropriate treatment option. These might include:
gv
• Eliminating or avoiding the risk (e.g., stopping the activity)
• Reducing the risk (e.g., implementing controls)
e9
• Transferring the risk (e.g., to a third party)
• Accepting the risk (when capacity and appetite exist)
m
leadership at least semi-annually. Reports may include important information about key risks and
treatments, as well as emerging trends and general program updates (Control AWSCA-1.5).
I6
In addition to the ARM Risk Assessment, Internal Audit performs a separate Risk Assessment to identify
and prioritize significant AWS risks and uses this information to define the audit plan. The Risk Assessment
EK
incorporates input from multiple sources such as changes to the business, internal audits, operational
events, and emerging risks. The audit plan and any changes to the plan during the year are presented to
the Audit Committee. Internal Audit also communicates significant audit findings and associated action
zz
Additionally, at least on a monthly basis, AWS management reviews the AWS operational metrics and
n-
Correction of Errors (COEs) to improve the overall availability of AWS services and to identify areas of
improvements while mitigating risks to our environments. The “COE” documents are used to perform
ke
deep root cause analysis of certain incidents across AWS, document actions taken, and assign follow-up
action items and owners to track to resolution.
-to
mr
Gw
B. Communications
A7
AWS has implemented various methods of internal communication at a global level to help employees
understand their individual roles and responsibilities and to communicate significant events in a timely
manner. These methods include orientation and training programs for newly hired employees; annual
7
training programs are tailored based on employee roles and responsibilities that may include Amazon
g1
Security Awareness (ASA) (Control AWSCA-1.4), Software Developer Engineer (SDE) Bootcamp, ITAR
Secure Coding Training, Threat Modeling the Right Way for Amazon Builders Fraud/Bribery/Foreign
corrupt practices training, and Privacy Engineering Foundations for AWS Service Teams confidentiality
Rw
training, Managing Third Parties Using the Third-Party Risk Management Lifecycle, Export Compliance
trainings; regular management meetings for updates on business performance and other matters; and
electronic means such as video conferencing, electronic mail messages, and the posting of information
via the Amazon intranet on topics such as reporting of information security incidents and guidelines
ab
describing change management.
gv
C.1 Service Commitments e9
AWS communicates service commitments to user entities (AWS customers) in the form of Service Level
Agreements (SLAs), customer agreements (https://aws.amazon.com/agreement/), contracts or through
the description of the service offerings provided online through the AWS website. More information
m
AWS uses various methods of external communication to support its customer base and the community.
Mechanisms are in place to allow the AWS Support Escalation and Event Management (E2M) team to be
I6
notified and to notify customers of potential operational issues that could impact the customer
experience. AWS Health Dashboard is available to alert customers of “General Service Events” which show
EK
the health of all AWS services and “Your Account Events” shows events specific to the account. Current
status information can be checked by the customer on this site, or by leveraging Amazon EventBridge
Integrations or RSS feeds which allow customers to be notified of interruptions to each individual service.
zz
Details related to security and compliance with AWS can also be obtained on the AWS Security Center and
AWS Compliance websites.
n-
Customers have the ability to contact AWS through the ‘Contact us’ page for any issues related to the AWS
services. AWS provides publicly available mechanisms for external parties to contact AWS to report
ke
security events and publishes information including a system description and security and compliance
information addressing AWS commitments and responsibilities (Control AWSCA-9.5). Customers can also
subscribe to Premium Support offerings that include direct communication with the customer support
-to
team and proactive alerts for any customer impacting issues. AWS also deploys monitoring and alarming
mechanisms which are configured by AWS Service Owners to identify and notify operational and
management personnel of incidents when early warning thresholds are crossed on key operational
m
metrics (Control AWSCA-8.1). Additionally, incidents are logged within a ticketing system, assigned a
severity rating and tracked to resolution (Control AWSCA-8.2).
r
Gw
C.2 System Requirements
A7
The selection and use of services by AWS’ customers must be set up and operated under a shared
responsibility model so that the functionality of the services and the associated security is appropriately
managed. AWS is responsible for protecting the infrastructure that runs the service(s) offered in the AWS
7
Cloud. The customer’s responsibility is determined by the AWS Cloud service(s) that a customer selects
g1
and the interdependencies of those services within the AWS Cloud and their own networked
environment. Customers should assess the objectives for their network when designing IT components
by identifying the risk and corresponding controls to be implemented to address those risks. Customers
Rw
should carefully consider the services they choose as their responsibilities vary depending on the
service(s) as well as the type of configuration(s) and operational controls required as part of their security
responsibilities.
ab
When designing and developing its services, AWS management has created internal policies that are
relevant to the services and systems available to customers. The development of these policies and
procedures supports management with decision making and the operational teams with business
gv
requirements and management of each service and system. As each AWS service is unique, the system
requirements to use different services vary depending on the service and each customer’s environment.
e9
AWS has processes and infrastructure in place to make the services available to customers to meet their
needs. AWS communicates its system requirements to customers and how to get started with using the
AWS services in the form of user guides, developer guides, API references, service specific tutorials, or
m
SDK toolkits. More information regarding the AWS Documentation can be found at
https://docs.aws.amazon.com/. These resources help the customers with architecting the AWS services
kc
AWS has identified the following objectives to support the security, change, and operational processes
I6
underlying their service commitments and business requirements. The objectives ensure the system
operates and mitigates the risks that threaten the achievement of the service commitments and system
EK
• Data integrity is maintained through all phases, including transmission, storage and processing.
zz
• Procedures have been established so that Amazon employee user accounts are added, modified
and deleted in a timely manner and reviewed on a periodic basis.
n-
• Policies and mechanisms are in place to appropriately restrict unauthorized internal and external
access to data and customer content is appropriately segregated from other customers.
ke
Gw
• Controls are implemented to safeguard data from within and outside of the boundaries of
environments which store a customer’s content to meet the service commitments.
A7
D. Procedures
7
D.1 Security Organization
g1
AWS has an established information security organization that is managed by the AWS Security team and
is led by the AWS Chief Information Security Officer (CISO). AWS Security team responsibilities are defined
and allocated across the organization. The AWS Security team works with AWS service teams, other
Rw
internal security teams, and external parties to ensure that security risks are mitigated (Control Objective
1: Security Organization). AWS Security establishes and maintains policies and procedures to delineate
standards for logical access on the AWS system and infrastructure hosts. The policies also identify
ab
functional responsibilities for the administration of logical access and security. Where applicable, AWS
Security leverages the information system framework and policies established and maintained by Amazon
Corporate Information Security. AWS and Amazon Corporate Information Security policies are reviewed
gv
and approved on an annual basis by AWS Security Leadership and are used to support AWS in meeting
the service commitments made to the customer (Control AWSCA-1.1, AWSCA -1.2, and AWSCA-1.3).
e9
As part of this annual assessment, the following policies were inspected to verify approval occurred within
the last year:
m
Policy
Data Center Security Standard: Media Handling, Secure Software Development Policy
EK
AWS Facility Badge Management and Use Standard AWS Security Awareness Training Policy
n-
AWS Identification and Authentication Policy AWS System and Communications Protection
Policy
ke
AWS Incident Response Policy AWS System and Information Integrity Policy
AWS Information Security Risk Management Policy AWS System Maintenance Policy
-to
AWS Internal Privacy Policy AWS Third Party Information Sharing Policy
AWS has a security awareness and training policy that is disseminated via an internal Amazon
m
communication portal to all employees. This policy addresses purpose, scope, roles, responsibilities, and
r
Gw
management commitment. AWS maintains and provides security awareness training to all information
system users on an annual basis. The policy also includes components as privacy, data protection training,
A7
and data handling leading practices (Control AWSCA-1.4).
As a part of AWS’ responsibilities within the shared responsibility model, AWS implements the three lines
of defense model established by the Institute of Internal Auditors (IIA), discussed in the IIA’s Three Lines
7
Model“https://www.theiia.org/en/content/position-papers/2020/the-iias-three-lines-model-an-update-
g1
of-the-three-lines-of-defense/” whitepaper. In this model, operational management is the first line of
defense, the various risk control and compliance over-sight functions established by management are the
second line of defense (Control AWSCA-1.5), and independent assurance is the third.
Rw
As its third line of defense, Amazon has an Internal Audit function to periodically evaluate risks and assess
conformance to AWS security processes with due professional care (Control AWSCA-9.8). Further, AWS
Security Assurance works with third-party assessors to obtain an independent assessment of risk
ab
management content/processes by performing periodic security assessments and compliance audits or
examinations (e.g., SOC, FedRAMP, ISO, PCI) to evaluate the security, integrity, confidentiality, and
availability of information and resources. AWS management also collaborates with Internal Audit to
gv
determine the health of the AWS control environment and leverages this information to fairly present the
assertions made within the reports. e9
D.2 Employee User Access
Procedures exist so that Amazon employee and contractor user accounts are added, modified, or disabled
m
in a timely manner and are reviewed on a periodic basis. In addition, password configuration settings for
user authentication to AWS systems are managed in compliance with Amazon’s Password Policy (Control
kc
AWS has established policies and procedures to delineate standards for logical access to AWS systems
I6
and infrastructure hosts. Where permitted by law, AWS requires that employees undergo a background
screening, at the time of hiring, commensurate with their position and level of access, in accordance with
EK
the AWS Personnel Security Policy (Control AWSCA-9.2). The policies also identify functional
responsibilities for the administration of logical access and security.
zz
Additionally, AWS employees who have access to systems that could impact the confidentiality, integrity,
or availability, or privacy of customer content are required to complete a post-hire background screening
within a year from their last background check. Post-hire screening includes criminal screening
n-
requirements consistent with the pre-hire background screening. Access to the systems that could impact
the confidentiality, integrity, or availability, or privacy of customer content is managed by membership in
ke
permission groups. Employees who support internal services or have access to network resources are not
required to complete the post-hire background screening. Post-hire background screening is conducted
where it is legally permissible by local law, in accordance with the AWS Personnel Security Policy (Control
-to
AWSCA-9.9).
Account Provisioning
m
The responsibility for provisioning user access, which includes employee and contractor access is shared
across Human Resources (HR), Corporate Operations, and Service Owners.
r
Gw
A standard employee or contractor account with minimum privileges is provisioned in a disabled state
A7
when a hiring manager submits his or her new employee or contractor onboarding request in Amazon’s
HR system. The account is automatically enabled after the employee’s record is activated in Amazon’s HR
system. First time passwords are set to a unique value and are required to be changed on first use (Control
AWSCA-2.1).
7
g1
Access Management
AWS employs the concept of least privilege, allowing only the necessary access for users to accomplish
Rw
their job function. User accounts are created to have minimal access. Access above these least privileges
requires appropriate and separate authorization.
Access to resources including Services, Hosts, Network devices, and Windows and UNIX groups is
ab
approved in Amazon’s proprietary permission management system by the appropriate owner or manager.
Requests for changes in access are captured in the Amazon permissions management tool audit log. When
changes in an employee’s job function occur, continued access must be approved to the resource or it will
gv
be automatically revoked (Control AWSCA-2.2).
the infrastructure and network; explicit re-approval is required, or access to the resource is revoked. On
a semi-annual basis, AWS reviews the access to AWS accounts. When an internal user no longer has a
kc
required business need to access the operational management system, the user’s privileges and access to
the relevant systems are revoked (Control AWSCA-2.3).
I6
Access Removal
EK
Access is revoked when an employee’s record is terminated in Amazon’s HR system. Windows and UNIX
accounts are disabled, and Amazon’s permission management system removes the user from all systems
(Control AWSCA-2.4).
zz
Password Policy
n-
Access and administration of logical security for Amazon relies on user IDs, passwords and Kerberos to
authenticate users to services, resources and devices as well as to authorize the appropriate level of
ke
access for the user. AWS Security has established a password policy with required configurations and
expiration intervals. AWS has a credential monitoring and response process to monitor compromised
credentials for Amazon employees. Impacted user credentials are identified, tracked and rotated in a
-to
Gw
Remote Access
A7
AWS requires two-factor authentication over an approved cryptographic channel for authentication to
the internal AWS network from remote locations (Control AWSCA-2.6).
7
g1
Procedures and mechanisms are in place to appropriately restrict unauthorized internal and external
access to data, and access to customer content is appropriately segregated from other customers (Control
Objective 3: Logical Security).
Rw
APIs enable customers to articulate who has access to AWS services and resources (if resource-level
permissions are applicable to the service) that they own. AWS prevents customers from accessing AWS
resources that are not assigned to them via access permissions. User content is segregated by the service’s
ab
software. Content is only returned to individuals authorized to access the specified AWS service or
resource (if resource-level permissions are applicable to the service) (Control AWSCA-3.5).
gv
AWS performs Application Security (AppSec) reviews when needed for externally launched products,
services, and significant feature additions prior to launch to determine security risks are identified and
mitigated. As a part of the AppSec review, the Application Security team collects detailed information
e9
about the artifacts required for the review. The Application Security team tracks reviews against an
independently managed inventory of products and features to be released to ensure that none are
inadvertently launched before a completed review. As part of the security review, newly created or
m
modified IAM policies allowing end users to interact with launched updates are also reviewed. The
Application Security team then determines the granularity of review required based on the artifact’s
kc
design, threat model, and impact to AWS’ risk profile. During this process, they work with the service team
to identify, prioritize, and remediate security findings. The Application Security team provides their final
approval for launch only upon completion of the review (Control AWSCA-3.6). Penetration testing is
I6
performed as needed.
EK
The AWS Network consists of the internal data center facilities, servers, networking equipment and host
zz
software systems that are within AWS’ control and are used to provide the services.
The AWS network provides significant protection against traditional network security issues. The following
n-
• Distributed Denial of Service (DDoS) Attacks. AWS API endpoints are hosted on large, Internet-
scale infrastructure and use proprietary DDoS mitigation techniques. Additionally, AWS’ networks
are multi-homed across a number of providers to achieve Internet access diversity (Control
-to
AWSCA-8.1).
• Man in the Middle (MITM) Attacks. All of the AWS APIs are available via TLS/SSL-protected
endpoints, which provide server authentication. Amazon EC2 AMIs automatically generate new
m
SSH host certificates on first boot and log them to the instance’s console. Customers can then use
r
Gw
the secure APIs to call the console and access the host certificates before logging into the instance
for the first time. Customers can use TLS/SSL for all of their interactions with AWS (Control
A7
AWSCA-3.11).
• IP Spoofing. The AWS-controlled, host-based firewall infrastructure will not permit an instance to
send traffic with a source IP or MAC address other than its own (Control AWSCA-3.10).
7
• Port Scanning. Unauthorized port scans by Amazon EC2 customers are a violation of the AWS
g1
Acceptable Use Policy. Violations of the AWS Acceptable Use Policy are taken seriously, and every
reported violation is investigated. Customers can report suspected abuse via the contacts
available on our website at: https://aws.amazon.com/contact-us/report-abuse/. Port scans of
Rw
Amazon EC2 instances are generally ineffective because, by default, all inbound ports on Amazon
EC2 instances are closed and are only opened by the customer. Customers’ strict management of
security groups can further mitigate the threat of port scans. Customers may request permission
to conduct vulnerability scans as required to meet specific compliance requirements. These scans
ab
must be limited to customers’ own instances and must not violate the AWS Acceptable Use Policy.
Advanced approval for these types of scans can be initiated by submitting a request via the
website at: https://aws.amazon.com/security/penetration-testing/.
gv
• Packet sniffing by other tenants. Virtual instances are designed to prevent other instances
running in promiscuous mode to receive or “sniff” traffic that is intended for a different virtual
e9
instance. While customers can place instances into promiscuous mode, the hypervisor will not
deliver any traffic to them that is not addressed to them. Even two virtual instances that are
owned by the same customer located on the same physical host cannot listen to each other’s
m
traffic. While Amazon EC2 does provide protection against one customer inadvertently or
maliciously attempting to view another’s data, as standard practice customers can encrypt
kc
Amazon corporate workstations. Client Engineering and Enterprise Engineering teams deploy
Anti-virus software at imaging to Amazon corporate workstations. Checks are in place to assure
EK
that Anti-virus software is installed, running and provide quarantining tooling that will isolate non-
compliant workstations from the network until remediation is affected (Control AWSCA-3.18).
In addition, firewall devices are configured to restrict access to production networks (Control AWSCA-
zz
3.1). The configurations of these firewall policies are maintained via an automatic push from a parent
server (Control AWSCA-3.2). All changes to the firewall policies are reviewed and approved (Control
n-
AWSCA-3.3).
AWS Security performs regular vulnerability scans on the host operating systems, web applications, and
ke
databases in the AWS environment using a variety of tools (Control AWSCA-3.4). AWS Security teams also
subscribe to newsfeeds for applicable vendor flaws and proactively monitor vendors’ websites and other
relevant outlets for new patches. AWS customers also have the ability to report issues to AWS via the
-to
AWS employs virtualization techniques including virtual networking devices and host-based firewalls,
m
which control traffic flow restrictions via Access Control Lists (ACLs) in EC2 and VPC, and as EC2 instances
r
Gw
which present a variety of operating systems. It is the responsibility of the customers to appropriately
configure server resources within the customer VPC.
A7
External Access Control
External access to services is configurable by customers via AWS Identity and Access Management (IAM).
7
IAM enables customers to securely control access to AWS services and resources for their users. Using
g1
IAM, customers can create and manage AWS users, roles, groups, and create and attach policies to those
entities with granular permissions that allow and deny access to AWS resources. Security Groups act as
firewalls and may also be used to control access to some in-scope applications such as VPC, EFS,
Rw
ElastiCache, and DMS. These groups default to a “deny all” access mode and customers must specifically
authorize network connectivity. This can be achieved by authorizing a network IP range or authorizing an
existing Security Group (Control AWSCA-3.5).
ab
Interacting with the Service
AWS provides several methods of interacting with the services in the form of APIs, Software Development
gv
Kits (SDKs), the AWS Management Console, and the AWS command line interface. All of the methods
ultimately rely on the public APIs and follow standard AWS authentication and authorization practices.
e9
Authenticated calls to AWS services are signed by either an X.509 certificate and/or the customer's AWS
Secret Access Key. When using the AWS Command Line Interface (AWS CLI) or one of the AWS SDKs to
make requests to AWS, these tools automatically sign the requests with the access key specified by the
m
customer when the tools were configured. Manually created requests must be signed using Signature
Version 4 or Signature Version 2. All AWS services support Signature Version 4, except Amazon SimpleDB,
kc
which requires Signature Version 2. For AWS services that support both versions, it is recommended to
use Signature Version 4.
I6
Internal Logging
EK
AWS maintains centralized repositories that provide core log archival functionality available for internal
use by AWS service teams. Leveraging S3 for high scalability, durability, and availability allows service
teams to collect, archive, and view service logs in a central log service.
zz
Production hosts at AWS are deployed using master baseline images (Control AWSCA-9.4). The baseline
images are equipped with a standard set of configurations and functions including logging and monitoring
n-
These logs are stored and accessible by AWS security teams for root cause analysis in the event of a
suspected security incident. Logs for a given host are also available to the team that owns that host in
case the team needs to search their logs for operational and security analysis.
-to
Encryption
m
Amazon cryptographic policy defines the appropriate cryptography implementation through the Amazon
cryptographic standard. The cryptography standard is based on FIPS standards, NIST standards, and/or
r
Gw
the Commercial National Security Algorithm Suite (Suite B). Implementation guidance including
appropriate encryption key length and algorithm specific parameters are provided to service teams
A7
through application security reviews. Additionally, AWS Security Engineers within the cryptography
review program review the appropriate use of cryptography within AWS. In addition, API calls can be
encrypted with TLS/SSL to maintain confidentiality. It is the customer’s responsibility to appropriately
configure and manage usage and implementation of available encryption options to meet compliance
7
requirements.
g1
Each production firmware version for the AWS Key Management Service HSM (Hardware Security
Module) has been certified with NIST under the FIPS 140-2 level 3 standard or is in the process of being
Rw
certified under the FIPS 140-3 level 3 (Control AWSCA-4.14). The AWS KMS team works with a National
Voluntary Laboratory Accreditation Program-certified (NVLAP) FIPS consulting lab (Example: Acumen)
who in turn works with NIST to get new HSM firmware versions certified. Every new firmware version that
is deployed into production has been submitted for validation with the lab; and, after validation will be
ab
submitted to NIST’s Cryptographic Module Validation Program (CMVP) to request its FIPS 140-3 review
and certification.
gv
Deletion of Customer Content
AWS provides customers the ability to delete their content. Once successfully removed, the data is
e9
rendered unreadable (Control AWSCA-7.7). For services that utilize ephemeral storage, such as EC2, the
ephemeral storage is deleted once the EC2 instance is deleted.
m
AWS Amplify
AWS Amplify is a set of tools and services that can be used together or on their own, to help front-end
web and mobile developers build scalable full stack applications, powered by AWS. With Amplify,
I6
customers can configure app backend and connect applications in minutes, deploy static web apps in a
few clicks and easily manage app content outside of AWS console. Amplify supports popular web
EK
frameworks including JavaScript, React, Angular, Vue, Next.js, and mobile platforms including Android,
iOS, React Native, Ionic, and Flutter.
zz
automatically converting customers’ source servers from physical, virtual, or cloud infrastructure to run
natively on AWS. Customers are able to use the same automated process to migrate a wide range of
ke
applications to AWS without making changes to applications, their architecture, or the migrated servers.
Amazon API Gateway is a service that makes it easy for developers to publish, maintain, monitor, and
secure APIs at any scale. With Amazon API Gateway, customers can create a custom API to code running
in AWS Lambda, and then call the Lambda code from customers' API. Amazon API Gateway can execute
m
AWS Lambda code in a customer’s account, start AWS Step Functions state machines, or make calls to
AWS Elastic Beanstalk, Amazon EC2, or web services outside of AWS with publicly accessible HTTP
r
Gw
endpoints. Using the Amazon API Gateway console, customers can define customers' REST API and its
associated resources and methods, manage customers' API lifecycle, generate customers' client SDKs, and
A7
view API metrics.
7
better security, management, and productivity. AppFabric aggregates and normalizes SaaS data (e.g., user
g1
event logs, user access) across SaaS applications without the need to write custom data integrations.
Amazon AppFlow
Rw
Amazon AppFlow is an integration service that enables customers to securely transfer data between
Software-as-a-Service (SaaS) applications like Salesforce, SAP, Zendesk, Slack, and ServiceNow, and AWS
services like Amazon S3 and Amazon Redshift. With AppFlow, customers can run data flows at enterprise
scale at the frequency they choose - on a schedule, in response to a business event, or on demand.
ab
Customers are able to configure data transformation capabilities like filtering and validation to generate
rich, ready-to-use data as part of the flow itself, without additional steps.
gv
AWS App Mesh
AWS App Mesh is a service mesh that provides application-level networking which allows customer
services to communicate with each other across multiple types of compute infrastructure. App Mesh gives
e9
customers end-to-end visibility and high availability for their applications. AWS App Mesh makes it easy
to run services by providing consistent visibility and network traffic controls, which helps to deliver secure
services. App Mesh removes the need to update application code to change how monitoring data is
m
collected or traffic is routed between services. App Mesh configures each service to export monitoring
data and implements consistent communications control logic across applications.
kc
applications and APIs, at scale and with no prior infrastructure experience required. The service provides
a simplified infrastructure-less abstraction for multi-concurrent web applications and API-based services.
EK
With App Runner, infrastructure components like build, load balancers, certificates and application
replicas are managed by AWS. Customers simply provide their source-code (or a pre-built container
image) and get a service endpoint URL in return against which requests can be made.
zz
desktop applications from anywhere. Amazon AppStream 2.0 simplifies application management,
improves security, and reduces costs by moving a customer’s applications from their users’ physical
ke
devices to the AWS Cloud. The Amazon AppStream 2.0 streaming protocol provides customers a
responsive, fluid performance that is almost indistinguishable from a natively installed application. With
Amazon AppStream 2.0, customers can realize the agility to support a broad range of compute and storage
-to
AWS AppSync
m
AWS AppSync is a service that allows customers to easily develop and manage GraphQL APIs. Once
deployed, AWS AppSync automatically scales the API execution engine up and down to meet API request
r
Gw
volumes. AWS AppSync offers GraphQL setup, administration, and maintenance, with high availability
serverless infrastructure built in.
A7
AWS Artifact (Effective August 15, 2023)
AWS Artifact is a self-service audit artifact retrieval portal that provides customers with on-demand access
to AWS’ compliance documentation and AWS agreements. Customers can use AWS Artifact Reports to
7
download AWS security and compliance documents, such as AWS ISO certifications, Payment Card
g1
Industry (PCI), and System and Organization Control (SOC) reports. Customers can use AWS Artifact
Agreements to review, accept, and track the status of AWS agreements.
Rw
Amazon Athena
Amazon Athena is an interactive query service that makes it easy to analyze data in Amazon S3 using
standard SQL. Athena is serverless, so there is no infrastructure for customers to manage. Athena is highly
available; and executes queries using compute resources across multiple facilities and multiple devices in
ab
each facility. Amazon Athena uses Amazon S3 as its underlying data store, making customers’ data highly
available and durable.
gv
AWS Audit Manager
AWS Audit Manager helps customers continuously audit AWS usage to simplify how customers manage
risk and compliance with regulations and industry standards. AWS Audit Manager makes it easier to
e9
evaluate whether policies, procedures, and activities—also known as controls—are operating as
intended. The service offers prebuilt frameworks with controls that are mapped to well-known industry
standards and regulations, full customization of frameworks and controls, and automated collection and
m
Amazon Augmented AI (excludes Public Workforce and Vendor Workforce for all features)
Amazon Augmented AI (A2I) is a machine learning service which makes it easy to build the workflows
required for human review. Amazon A2I brings human review to all developers, removing the
I6
undifferentiated heavy lifting associated with building human review systems or managing large numbers
of human reviewers whether it runs on AWS or not. The public and vendor workforce options of this
EK
Amazon EC2 Auto Scaling launches/terminates instances on a customer's behalf according to conditions
customers define, such as schedule, changing metrics like average CPU utilization, or health of the
instance as determined by EC2 or ELB health checks. It allows customers to have balanced compute across
n-
AWS Backup
AWS Backup is a backup service that makes it easy to centralize and automate the back up of data across
AWS services in the cloud as well as on premises using the AWS Storage Gateway. Using AWS Backup, the
-to
customers can centrally configure backup policies and monitor backup activity for AWS resources, such as
Amazon EBS volumes, Amazon RDS databases, Amazon DynamoDB tables, Amazon EFS file systems, and
AWS Storage Gateway volumes. AWS Backup automates and consolidates backup tasks previously
m
performed service-by-service, removing the need to create custom scripts and manual processes.
r
Gw
AWS Batch
AWS Batch enables developers, scientists, and engineers to run batch computing jobs on AWS. AWS Batch
A7
dynamically provisions the optimal quantity and type of compute resources (e.g., CPU or memory
optimized instances) based on the volume and specific resource requirements of the batch jobs
submitted. AWS Batch plans, schedules, and executes customers’ batch computing workloads across the
full range of AWS compute services and features, such as Amazon EC2 and Spot Instances.
7
g1
Amazon Bedrock (Effective August 15, 2023)
Amazon Bedrock is a fully managed service that makes foundation models (FMs) from Amazon and
leading Artificial Intelligence (AI) companies available through an API, so customers can choose from
Rw
various FMs to find the model that's best suited for their use case. With the Amazon Bedrock serverless
experience, customers can quickly get started, easily experiment with FMs, privately customize FMs with
their own data, and seamlessly integrate and deploy them into customer applications using AWS tools
ab
and capabilities. Agents for Amazon Bedrock are fully managed and make it easier for developers to
create generative-AI applications that can deliver up-to-date answers based on proprietary knowledge
sources and complete tasks for a wide range of use cases. The Foundational Models (FMs) from Amazon
gv
and leading AI companies, made available by Amazon Bedrock, are not included in the design of the
controls described in the SOC report. e9
Amazon Braket
Amazon Braket, the quantum computing service of AWS, is designed to help accelerate scientific research
and software development for quantum computing. Amazon Braket provides everything customers need
m
to build, test, and run quantum programs on AWS, including access to different types of quantum
computers and classical circuit simulators and a unified development environment for building and
kc
executing quantum circuits. Amazon Braket also manages the classical infrastructure required for the
execution of hybrid quantum-classical algorithms. When customers choose to interact with quantum
computers provided by third-parties, Amazon Braket anonymizes the content, so that only content
I6
necessary to process the quantum task is sent to the quantum hardware provider. No AWS account
information is shared and customer data is not stored outside of AWS.
EK
and their internal connected resources. SSL/TLS certificates are used to secure network communications
and establish the identity of websites over the Internet as well as resources on private networks. AWS
n-
Certificate Manager removes the manual process of purchasing, uploading, and renewing SSL/TLS
certificates.
ke
AWS Chatbot
AWS Chatbot is an AWS service that enables DevOps and software development teams to use Slack or
-to
Amazon Chime chat rooms to monitor and respond to operational events in their AWS Cloud. AWS
Chatbot processes AWS service notifications from Amazon Simple Notification Service (Amazon SNS), and
forwards them to Slack or Amazon Chime chat rooms so teams can analyze and act on them. Teams can
respond to AWS service events from a chat room where the entire team can collaborate, regardless of
m
location.
r
Gw
Amazon Chime
A7
Amazon Chime is a communications service that lets customers meet, chat, and place business calls inside
and outside organizations, all using a single application. With Amazon Chime, customers can conduct and
attend online meetings with HD video, audio, screen sharing, meeting chat, dial—in numbers, and in-room
video conference support. Customer can use chat and chat rooms for persistent communications across
7
desktop and mobile devices. Customers are also able to administer enterprise users, manage policies, and
g1
set up SSO or other advanced features in minutes using Amazon Chime management console.
Rw
The Amazon Chime SDK is a set of real-time communications components that customers can use to
quickly add messaging, audio, video, and screen sharing capabilities to their web or mobile applications.
Customers can use the Amazon Chime SDK to build real-time media applications that can send and receive
audio and video and allow content sharing. The Amazon Chime SDK works independently of any Amazon
ab
Chime administrator accounts and does not affect meetings hosted on Amazon Chime.
gv
AWS Clean Rooms helps customers and their partners more easily and securely collaborate and analyze
their collective datasets—without sharing or copying one another’s underlying data. With AWS Clean
Rooms, customers can create a secure data clean room in minutes and collaborate with any other
e9
company on the AWS Cloud to generate unique insights about advertising campaigns, investment
decisions, and research and development. With AWS Clean Rooms, customers can analyze data with up
to four other parties in a single collaboration. Customers can securely generate insights from multiple
m
companies without having to write code. Customers can create a clean room, invite companies they want
to collaborate with, and select which participants can run analyses within the collaboration.
kc
AWS Cloud9
AWS Cloud9 is an integrated development environment, or IDE. The AWS Cloud9 IDE offers a rich code-
I6
editing experience with support for several programming languages and runtime debuggers, and a built-
in terminal. It contains a collection of tools that customers use to code, build, run, test, and debug
EK
software, and helps customers release software to the cloud. Customers access the AWS Cloud9 IDE
through a web browser. Customers can configure the IDE to their preferences. Customers can switch color
themes, bind shortcut keys, enable programming language-specific syntax coloring and code formatting,
zz
and more.
Amazon Cloud Directory enables customers to build flexible cloud-native directories for organizing
hierarchies of data along multiple dimensions. Customers also can create directories for a variety of use
ke
cases, such as organizational charts, course catalogs, and device registries. For example, customers can
create an organizational chart that can be navigated through separate hierarchies for reporting structure,
location, and cost center.
-to
their application resources. Cloud Map maintains the location of these changing resources to increase
application availability.
r
Gw
Customers can register any application resource, such as databases, queues, microservices, and other
A7
cloud resources, with custom names. Cloud Map then constantly checks the health of resources to make
sure the location is up-to-date. The application can then query the registry for the location of the
resources needed based on the application version and deployment environment.
7
AWS CloudFormation
g1
AWS CloudFormation is a service to simplify provisioning of AWS resources such as Auto Scaling groups,
ELBs, Amazon EC2, Amazon VPC, Amazon Route 53, and others. Customers author templates of the
infrastructure and applications they want to run on AWS, and the AWS CloudFormation service
Rw
automatically provisions the required AWS resources and their relationships as defined in these
templates.
Amazon CloudFront (excludes content delivery through Amazon CloudFront Embedded Point of
ab
Presences)
Amazon CloudFront is a fast content delivery network (CDN) web service that securely delivers data,
videos, applications and APIs to customers globally with low latency and high-transfer speeds. CloudFront
gv
offers the most advanced security capabilities, including field level encryption and HTTPS support,
seamlessly integrated with AWS Shield, AWS Web Application Firewall and Route 53 to protect against
multiple types of attacks including network and application layer DDoS attacks. These services co-reside
e9
at edge networking locations – globally scaled and connected via the AWS network backbone – providing
a more secure, performant, and available experience for the users.
m
CloudFront delivers customers' content through a worldwide network of Edge locations. When an end
user requests content that customers serve with CloudFront, the user is routed to the Edge location that
kc
provides the lowest latency, so content is delivered with the best possible performance. If the content is
already in that Edge location, CloudFront delivers it immediately.
I6
AWS CloudHSM
AWS CloudHSM is a service that allows customers to use dedicated HSMs within the AWS cloud. AWS
EK
CloudHSM is designed for applications where the use of HSMs for encryption and key storage is
mandatory.
zz
AWS acquires these production HSM devices securely using the tamper evident authenticable (TEA) bags
from the vendors. These TEA bag serial numbers and production HSM serial numbers are verified against
data provided out-of-band by the manufacturer and logged by approved individuals in tracking systems
n-
(Control AWSCA-4.15).
ke
AWS CloudHSM allows customers to store and use encryption keys within HSMs in AWS data centers.
With AWS CloudHSM, customers maintain full ownership, control, and access to keys and sensitive data
while Amazon manages the HSMs in close proximity to customer applications and data. All HSM media is
-to
securely decommissioned and physically destroyed, verified by two personnel, prior to leaving AWS
Secure Zones (Control AWSCA-5.13).
mr
Gw
AWS CloudShell
AWS CloudShell is a browser-based shell used to securely manage, explore, and interact with your AWS
A7
resources. CloudShell is pre-authenticated with customer console credentials. Common development and
operations tools are pre-installed, so no local installation or configuration is required. With CloudShell,
customers can run scripts with the AWS Command Line Interface (AWS CLI), experiment with AWS service
APIs using the AWS SDKs, or use a range of other tools to be productive. Customers can use CloudShell
7
right from their browser.
g1
AWS CloudTrail
AWS CloudTrail is a web service that records AWS activity for customers and delivers log files to a specified
Rw
Amazon S3 bucket. The recorded information includes the identity of the API caller, the time of the API
call, the source IP address of the API caller, the request parameters, and the response elements returned
by the AWS service.
ab
AWS CloudTrail provides a history of AWS API calls for customer accounts, including API calls made via the
AWS Management Console, AWS SDKs, command line tools, and higher-level AWS services (such as AWS
CloudFormation). The AWS API call history produced by AWS CloudTrail enables security analysis, resource
gv
change tracking, and compliance auditing.
Amazon CloudWatch
e9
Amazon CloudWatch is a monitoring and management service built for developers, system operators, site
reliability engineers (SRE), and IT managers. CloudWatch provides the customers with data and actionable
insights to monitor their applications, understand and respond to system-wide performance changes,
m
optimize resource utilization, and get a unified view of operational health. CloudWatch collects
monitoring and operational data in the form of logs, metrics, and events, providing the customers with a
kc
unified view of AWS resources, applications and services that run on AWS, and on-premises servers.
Amazon CloudWatch Logs is a service used to monitor, store, and access log files from Amazon Elastic
Compute Cloud (EC2) instances, AWS CloudTrail, Route 53 and other sources. CloudWatch Logs enables
EK
customers to centralize the logs from systems, applications and AWS services used in a single, highly
scalable service. Customers can easily view them, search for patterns, filter on specific fields or archive
them securely for future analysis. CloudWatch Logs enables customers to view logs, regardless of their
zz
source, as a single and consistent flow of events ordered by time, and to query them based on specific
criteria.
n-
AWS CodeBuild
AWS CodeBuild is a build service that compiles source code, runs tests, and produces software packages
ke
that are ready to deploy. CodeBuild scales continuously and processes multiple builds concurrently, so
that customers’ builds are not left waiting in a queue. Customers can use prepackaged build environments
or can create custom build environments that use their own build tools. AWS CodeBuild eliminates the
-to
need to set up, patch, update, and manage customers’ build servers and software.
AWS CodeCommit
m
AWS CodeCommit is a source control service that hosts secure Git-based repositories. It allows teams to
collaborate on code in a secure and highly scalable ecosystem. CodeCommit eliminates the need for
r
Gw
customers to operate their own source control system or worry about scaling their infrastructure.
CodeCommit can be used to securely store anything from source code to binaries, and it works seamlessly
A7
with the existing Git tools.
AWS CodeDeploy
AWS CodeDeploy is a deployment service that automates software deployments to a variety of compute
7
services such as Amazon EC2, AWS Fargate, AWS Lambda, and the customer’s on-premises servers. AWS
g1
CodeDeploy allows customers to rapidly release new features, helps avoid downtime during application
deployment, and handles the complexity of updating the applications.
Rw
AWS CodePipeline
AWS CodePipeline is a continuous delivery service that helps customers automate release pipelines for
fast and reliable application and infrastructure updates. CodePipeline automates the build, test, and
deploy phases of customers release process every time there is a code change, based on the release model
ab
defined by the customer. This enables customers to rapidly and reliably deliver features and updates.
Customers can easily integrate AWS CodePipeline with third-party services such as GitHub or with their
own custom plugin.
gv
Amazon CodeWhisperer (Effective February 15, 2024)
Amazon CodeWhisperer is a productivity tool that generates real-time, single-line or full-function code
e9
suggestions in the customers’ integrated development environment (IDE) and in the command line to help
quickly build software. Customers can quickly and easily accept the top suggestion, view more
suggestions, or continue writing their own code.
m
Amazon Cognito
kc
Amazon Cognito lets customers add user sign-up, sign-in, and manage permissions for mobile and web
applications. Customers can create their own user directory within Amazon Cognito. Customers can also
choose to authenticate users through social identity providers such as Facebook, Twitter, or Amazon; with
I6
SAML identity solutions; or by using customers' own identity system. In addition, Amazon Cognito enables
customers to save data locally on users' devices, allowing customers' applications to work even when the
EK
devices are offline. Customers can then synchronize data across users' devices so that their app
experience remains consistent regardless of the device they use.
zz
Amazon Comprehend
Amazon Comprehend is a natural language processing (NLP) service that uses machine learning to find
insights and relationships in text. Amazon Comprehend uses machine learning to help the customers
n-
uncover insights and relationships in their unstructured data without machine learning experience. The
service identifies the language of the text; extracts key phrases, places, people, brands, or events;
ke
understands how positive or negative the text is; analyzes text using tokenization and parts of speech;
and automatically organizes a collection of text files by topic.
-to
Amazon Comprehend Medical, customers can quickly and accurately gather information, such as medical
condition, medication, dosage, strength, and frequency from a variety of sources like doctors’ notes,
r
Gw
clinical trial reports, and patient health records. Amazon Comprehend Medical uses advanced machine
learning models to accurately and quickly identify medical information, such as medical conditions and
A7
medications, and determines their relationship to each other, for instance, medicine dosage and strength.
AWS Config
AWS Config enables customers to assess, audit, and evaluate the configurations of their AWS resources.
7
AWS Config continuously monitors and records AWS resource configurations and allows customers to
g1
automate the evaluation of recorded configurations against desired configurations. With AWS Config,
customers can review changes in configurations and relationships between AWS resources, dive into
detailed resource configuration histories, and determine overall compliance against the configurations
Rw
specified within the customers’ internal guidelines. This enables customers to simplify compliance
auditing, security analysis, change management, and operational troubleshooting.
Amazon Connect
ab
Amazon Connect is an easy-to-use omnichannel cloud contact center that helps customers provide
superior customer service across voice, chat, and tasks at lower cost than traditional contact center
systems. Amazon Connect simplifies contact center operations, improves agent efficiency and lowers
gv
costs. Customers can setup a contact center in minutes that can scale to support millions of customers
from the office or as a virtual contact center. e9
AWS Control Tower
AWS Control Tower provides the easiest way to set up and govern a new, secure, multi-account AWS
environment based on AWS’ best practices established through AWS’ experience working with thousands
m
of enterprises as they move to the cloud. With AWS Control Tower, builders can provision new AWS
accounts that conform to customer policies. If customers are building a new AWS environment, starting
kc
out on the journey to AWS, starting a new cloud initiative, or are completely new to AWS, Control Tower
will help customers get started quickly with governance and AWS’ best practices built-in.
I6
discover, share, and govern data stored across AWS, on premises, and third-party sources. With Amazon
DataZone, engineers, data scientists, product managers, analysts, and business users can quickly access
data throughout an organization so that they can discover, use, and collaborate to derive data-driven
zz
insights. Administrators and data owners who oversee an organization's data assets can easily manage
and govern access to data. Amazon DataZone provides built-in workflows for data consumers to request
access to data and for data owners to approve the access.
n-
AWS Data Exchange makes it easy to find, subscribe to, and use third-party data in the cloud. Qualified
data providers include category-leading brands. Once subscribed to a data product, customers can use
the AWS Data Exchange API to load data directly into Amazon S3 and then analyze it with a wide variety
-to
of AWS analytics and machine learning services. For data providers, AWS Data Exchange makes it easy to
mr
Gw
reach the millions of AWS customers migrating to the cloud by removing the need to build and maintain
infrastructure for data storage, delivery, billing, and entitling.
A7
AWS Database Migration Service (DMS)
AWS Database Migration Service (DMS) is a cloud service that enables customers to migrate relational
databases, data warehouses, NoSQL databases, and other types of data stores. AWS DMS can be used to
7
migrate data into the AWS Cloud, between on-premises instances (through AWS Cloud setup), or between
g1
combinations of cloud and on-premises setups. The service supports homogenous migrations within one
database platform, as well as heterogeneous migrations between different database platforms. AWS
Database Migration Service can also be used for continuous data replication with high-availability.
Rw
AWS DataSync
AWS DataSync is an online data transfer service that simplifies, automates and accelerates moving data
between on-premises storage and AWS Storage services, as well as between AWS Storage services.
ab
DataSync can copy data between Network File System (NFS), Server Message Block (SMB) file servers, self-
managed object storage, AWS Snowcone, Amazon Simple Storage Service (Amazon S3) buckets, Amazon
EFS file systems and Amazon FSx for Windows File Server file systems. DataSync automatically handles
gv
many of the tasks related to data transfers that can slow down migrations or burden customers’ IT
operations, including running customers own instances, handling encryption, managing scripts, network
optimization, and data integrity validation.
e9
Amazon Detective
Amazon Detective allows customers to easily analyze, investigate, and quickly identify the root cause of
m
potential security issues or suspicious activity. Amazon Detective collects log data from customer’s AWS
resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data
kc
that enables customers to conduct faster and more efficient security investigations. AWS Security services
can be used to identify potential security issues or findings.
I6
Amazon Detective can analyze trillions of events from multiple data sources and automatically creates a
unified, interactive view of the resources, users, and the interactions between them over time. With this
EK
unified view, customers can visualize all the details and context in one place to identify the underlying
reasons for the findings, drill down into relevant historical activities, and quickly determine the root cause.
zz
from normal operating patterns so customers can identify operational issues before they impact them.
ke
DevOps Guru uses ML models informed by years of Amazon.com and AWS operational excellence to
identify anomalous application behavior (for example, increased latency, error rates, resource constraints,
and others) and helps surface critical issues that could cause potential outages or service disruptions.
-to
When DevOps Guru identifies a critical issue, it automatically sends an alert and provides a summary of
mr
Gw
related anomalies, the likely root cause, and context for when and where the issue occurred. When
possible, DevOps Guru also helps provide recommendations on how to remediate the issue.
A7
AWS Direct Connect
AWS Direct Connect enables customers to establish a dedicated network connection between their
network and one of the AWS Direct Connect locations. Using AWS Direct Connect, customers can establish
7
private connectivity between AWS and their data center, office, or colocation environment.
g1
AWS Directory Service (excludes Simple AD)
AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft Active
Rw
Directory (AD), enables customers' directory-aware workloads and AWS resources to use managed Active
Directory in the AWS Cloud. AWS Managed Microsoft AD stores directory content in encrypted Amazon
Elastic Block Store volumes using encryption keys. Data in transit to and from Active Directory clients is
encrypted when it travels through Lightweight Directory Access Protocol (LDAP) over customers' Amazon
ab
Virtual Private Cloud (VPC) network. If an Active Directory client resides in an off-cloud network, the traffic
travels to customers' VPC by a virtual private network link or an AWS Direct Connect link.
gv
Amazon DocumentDB (with MongoDB compatibility)
Amazon DocumentDB (with MongoDB compatibility) is a fast, scalable, and highly available document
e9
database service that supports MongoDB workloads. Amazon DocumentDB is designed from the ground-
up to give customers the performance, scalability, and availability customers need when operating
mission-critical MongoDB workloads at scale. Amazon DocumentDB implements the Apache 2.0 open
m
source MongoDB 3.6 API by emulating the responses that a MongoDB client expects from a MongoDB
server, allowing customers to use their existing MongoDB drivers and tools with Amazon DocumentDB.
kc
Amazon DocumentDB uses a distributed, fault-tolerant, self-healing storage system that auto-scales up to
64 TB per database cluster.
I6
Amazon DynamoDB
Amazon DynamoDB is a managed NoSQL database service. Amazon DynamoDB enables customers to
EK
offload to AWS the administrative burdens of operating and scaling distributed databases such as
hardware provisioning, setup and configuration, replication, software patching, and cluster scaling.
Customers can create a database table that can store and retrieve data and serve any requested traffic.
zz
Amazon DynamoDB automatically spreads the data and traffic for the table over a sufficient number of
servers to handle the request capacity specified and the amount of data stored, while maintaining
n-
consistent, fast performance. All data items are stored on Solid State Drives (SSDs) and are automatically
replicated across multiple AZs in a region.
ke
microseconds—even at millions of requests per second. DAX does the heavy lifting required to add in-
memory acceleration to your DynamoDB tables, without requiring developers to manage cache
invalidation, data population, or cluster management.
mr
Gw
EC2 Image Builder
EC2 Image Builder makes it easier to automate the creation, management, and deployment of
A7
customized, secure, and up-to-date “golden” server images that are pre-installed and pre-configured with
software and settings to meet specific IT standards.
7
AWS Elastic Beanstalk is an application container launch program for customers to launch and scale their
g1
applications on top of AWS. Customers can use AWS Elastic Beanstalk to create new environments using
Elastic Beanstalk curated programs and their applications, deploy application versions, update application
configurations, rebuild environments, update AWS configurations, monitor environment health and
Rw
availability, and build on top of the scalable infrastructure provided by underlying services such as Auto
Scaling, Elastic Load Balancing, Amazon EC2, Amazon VPC, Amazon Route 53, and others.
ab
Amazon Elastic Block Store (EBS) provides persistent block storage volumes for use with Amazon EC2
instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its AZ to protect
customers from component failure. Amazon EBS allows customers to create storage volumes from 1 GB
gv
to 16 TB that can be mounted as devices by Amazon EC2 instances. Storage volumes behave like raw,
unformatted block devices, with user supplied device names and a block device interface. Customers can
create a file system on top of Amazon EBS volumes, or use them in any other way one would use a block
e9
device (e.g., a hard drive).
Amazon EBS volumes are presented as raw unformatted block devices that have been wiped prior to being
m
made available for use. Wiping occurs before reuse. If customers have procedures requiring that all data
be wiped via a specific method, customers can conduct a wipe procedure prior to deleting the volume for
kc
compliance with customer requirements. Amazon EBS includes Data Lifecycle Manager, which provides a
simple, automated way to back up data stored on Amazon EBS volumes.
I6
provides scalable computing capacity using server instances in AWS’ data centers. Amazon EC2 is designed
to make web-scale computing easier by enabling customers to obtain and configure capacity with minimal
friction. Customers create and launch instances, which are virtual machines that are available in a wide
zz
Security within Amazon EC2 is provided on multiple levels: the operating system (OS) of the host layer,
n-
the virtual instance OS or guest OS, a firewall, and signed API calls. Each of these items builds on the
capabilities of the others. This helps prevent data contained within Amazon EC2 from being intercepted
ke
by unauthorized systems or users and to provide Amazon EC2 instances themselves security without
sacrificing flexibility of configuration. The Amazon EC2 service utilizes a hypervisor to provide memory
and CPU isolation between virtual machines and controls access to network, storage, and other devices,
-to
and maintains strong isolation between guest virtual machines. Independent auditors regularly assess the
security of Amazon EC2 and penetration teams regularly search for new and existing vulnerabilities and
attack vectors.
m
AWS prevents customers from accessing physical hosts or instances not assigned to them by filtering
r
Gw
through the virtualization software (Control AWSCA-3.12).
A7
Amazon EC2 provides a complete firewall solution, referred to as a Security Group; this mandatory
inbound firewall is configured in a default deny-all mode and Amazon EC2 customers must explicitly open
the ports needed to allow inbound traffic (Control AWSCA-3.9).
7
Amazon provides a Time Sync function for time synchronization in EC2 Linux instances with the
g1
Coordinated Universal Time (UTC). It is delivered over the Network Time Protocol (NTP) and uses a fleet
of redundant satellite-connected and atomic clocks in each region to provide a highly accurate reference
clock via the local 169.254.169.123 IP address. Irregularities in the Earth’s rate of rotation that cause UTC
Rw
to drift with respect to the International Celestial Reference Frame (ICRF), by an extra second, are called
leap second. Time Sync addresses this clock drift by smoothing out leap seconds over a period of time
(commonly called leap smearing) which makes it easy for customer applications to deal with leap seconds
(Control AWSCA-7.10).
ab
Amazon Elastic Container Registry (ECR)
Amazon Elastic Container Registry is a Docker container image registry that makes it easy for developers
gv
to store, manage, and deploy Docker container images. Amazon Elastic Container Registry is integrated
with Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS).
e9
Amazon Elastic Container Service [both Fargate and EC2 launch types]
Amazon Elastic Container Service is a highly scalable, high performance container management service
that supports Docker containers and allows customers to easily run applications on a managed cluster of
m
Amazon EC2 instances. Amazon Elastic Container Service eliminates the need for customers to install,
operate, and scale customers' own cluster management infrastructure. With simple API calls, customers
kc
can launch and stop Docker-enabled applications, query the complete state of customers' clusters, and
access many familiar features like security groups, Elastic Load Balancing, EBS volumes, and IAM roles.
Customers can use Amazon Elastic Container Service to schedule the placement of containers across
I6
Customers can set up AWS Elastic Disaster Recovery on their source servers to initiate secure data
replication. Customer content is replicated to a staging area subnet in their AWS account, in the AWS
Region they select. The staging area design reduces costs by using affordable storage and minimal
n-
compute resources to maintain ongoing replication. Customers can perform non-disruptive tests to
confirm that implementation is complete. During normal operation, customers can maintain readiness by
ke
monitoring replication and periodically performing non-disruptive recovery and failback drills. If
customers need to recover applications, they can launch recovery instances on AWS within minutes, using
the most up-to-date server state or a previous point in time.
-to
Amazon Elastic Kubernetes Service (EKS) [both Fargate and EC2 launch types]
Amazon Elastic Kubernetes Service (EKS) makes it easy to deploy, manage, and scale containerized
m
applications using Kubernetes on AWS. Amazon EKS runs the Kubernetes management infrastructure for
the customer across multiple AWS AZs to eliminate a single point of failure. Amazon EKS is certified
r
Gw
Kubernetes conformant so the customers can use existing tooling and plugins from partners and the
Kubernetes community. Applications running on any standard Kubernetes environment are fully
A7
compatible and can be easily migrated to Amazon EKS.
7
attached file system interface via the NFS v4 protocol. EFS file systems grow and shrink elastically as data
g1
is added and deleted by users. Amazon EFS spreads data across multiple AZs; in the event that an AZ is
not reachable, the structure allows customers to still access their full set of data.
Rw
The customer is responsible for choosing which of their Virtual Private Clouds (VPCs) they want a file
system to be accessed from by creating resources called mount targets. One mount target exists for each
AZ, which exposes an IP address and DNS name for mounting the customer’s file system onto their EC2
instances. Customers then log into their EC2 instance and issue a ‘mount’ command, pointing at their
ab
mount target’ IP address or DNS name. A mount target is assigned one or more VPC security groups to
which it belongs. The VPC security groups define rules for what VPC traffic can reach the mount targets
and in turn can reach the file system.
gv
Elastic Load Balancing (ELB)
Elastic Load Balancing (ELB) provides customers with a load balancer that automatically distributes
e9
incoming application traffic across multiple Amazon EC2 instances in the cloud. It allows customers to
achieve greater levels of fault tolerance for their applications, seamlessly providing the required amount
of load balancing capacity needed to distribute application traffic.
m
Amazon ElastiCache
kc
Amazon ElastiCache automates management tasks for in-memory cache environments, such as patch
management, failure detection, and recovery. It works in conjunction with other AWS services to provide
a managed in-memory cache. For example, an application running in Amazon EC2 can securely access an
I6
Amazon ElastiCache Cluster in the same region with very slight latency.
EK
Using the Amazon ElastiCache service, customers create a Cache Cluster, which is a collection of one or
more Cache Nodes, each running an instance of the Memcached, Redis Engine, or DAX Engine. A Cache
Node is a self-contained environment which provides a fixed-size chunk of secure, network-attached RAM.
zz
Each Cache Node runs an instance of the Memcached, Redis Engine, or DAX Engine, and has its own DNS
name and port. Multiple types of Cache Nodes are supported, each with varying amounts of associated
memory.
n-
AWS Elemental MediaConnect is a high-quality transport service for live video. MediaConnect enables
customers to build mission-critical live video workflows in a fraction of the time and cost of satellite or
fiber services. Customers can use MediaConnect to ingest live video from a remote event site (like a
-to
stadium), share video with a partner (like a cable TV distributor), or replicate a video stream for processing
(like an over-the-top service). MediaConnect combines reliable video transport, highly secure stream
sharing, and real-time network traffic and video monitoring that allow customers to focus on their
m
Gw
AWS Elemental MediaConvert
AWS Elemental MediaConvert is a file-based video transcoding service with broadcast-grade features. It
A7
allows customers to create video-on-demand (VOD) content for broadcast and multiscreen delivery at
scale. The service combines advanced video and audio capabilities with a simple web services interface.
With AWS Elemental MediaConvert, customers can focus on delivering media experiences without having
to worry about the complexity of building and operating video processing infrastructure.
7
g1
AWS Elemental MediaLive
AWS Elemental MediaLive is a live video processing service. Customers can create high-quality video
streams for delivery to broadcast televisions and internet-connected multiscreen devices, like connected
Rw
TVs, tablets, smart phones, and set-top boxes. The service works by encoding live video streams in real-
time, taking a larger-sized live video source and compressing it into smaller versions for distribution to
viewers. AWS Elemental MediaLive enables customers to focus on creating live video experiences for
viewers without the complexity of building and operating video processing infrastructure.
ab
AWS Entity Resolution (Effective February 15, 2024)
AWS Entity Resolution is a service that helps customers match, link, and enhance their related records
gv
stored across multiple applications, channels, and data stores. AWS Entity Resolution offers matching
techniques, such as rule-based, machine learning (ML) model-powered, and data service provider
matching to help them more accurately link related sets of customer information, product codes, or
e9
business data codes.
Amazon Elastic MapReduce (EMR) is a web service that provides managed Hadoop clusters on Amazon
EC2 instances running a Linux operating system. Amazon EMR uses Hadoop processing combined with
kc
several AWS products to do such tasks as web indexing, data mining, log file analysis, machine learning,
scientific simulation, and data warehousing. Amazon EMR actively manages clusters for customers,
replacing failed nodes and adjusting capacity as requested. Amazon EMR securely and reliably handles a
I6
broad set of big data use cases, including log analysis, web indexing, data transformations (ETL), machine
learning, financial analysis, scientific simulation, and bioinformatics.
EK
Amazon EventBridge
Amazon EventBridge delivers a near real-time stream of events that describe changes in AWS resources.
zz
Customers can configure routing rules to determine where to send collected data to build application
architectures that react in real time to the data sources. Amazon EventBridge becomes aware of
operational changes as they occur and responds to these changes by taking corrective action as necessary
n-
by sending message to respond to the environment, activating functions, making changes and capturing
state information.
ke
an application’s performance, observability, and resiliency. FIS simplifies the process of setting up and
running controlled fault injection experiments across a range of AWS services, so teams can build
confidence in their application behavior.
mr
Gw
Amazon FinSpace
Amazon FinSpace is a data management and analytics service that makes it easy to store, catalog, and
A7
prepare financial industry data at scale. Amazon FinSpace reduces the time it takes for financial services
industry (FSI) customers to find and access all types of financial data for analysis.
7
AWS Firewall Manager is a security management service that makes it easier to centrally configure and
g1
manage AWS WAF rules across customer accounts and applications. Using Firewall Manager, customers
can roll out AWS WAF rules for their Application Load Balancers and Amazon CloudFront distributions
across accounts in AWS Organizations. As new applications are created, Firewall Manager also allows
Rw
customers to bring new applications and resources into compliance with a common set of security rules
from day one.
Amazon Forecast
ab
Amazon Forecast uses machine learning to combine time series data with additional variables to build
forecasts. With Amazon Forecast, customers can import time series data and associated data into Amazon
Forecast from their Amazon S3 database. From there, Amazon Forecast automatically loads the data,
gv
inspects it, and identifies the key attributes needed for forecasting. Amazon Forecast then trains and
optimizes a customer’s custom model and hosts them in a highly available environment where it can be
used to generate business forecasts.
e9
Amazon Forecast is protected by encryption. Any content processed by Amazon Forecast is encrypted
with customer keys through Amazon Key Management Service and encrypted at rest in the AWS Region
m
where a customer is using the service. Administrators can also control access to Amazon Forecast through
an AWS Identity and Access Management (IAM) permissions policy – ensuring that sensitive information
kc
Amazon Fraud Detector helps detect suspicious online activities such as the creation of fake accounts and
online payment fraud. Amazon Fraud Detector uses machine learning (ML) and 20 years of fraud detection
EK
expertise from AWS and Amazon.com to automatically identify fraudulent activity to catch more fraud,
faster. With Amazon Fraud Detector, customers can create a fraud detection ML model with just a few
clicks and use it to evaluate online activities in milliseconds.
zz
FreeRTOS
FreeRTOS is an operating system for microcontrollers that makes small, low-power edge devices easy to
n-
program, deploy, secure, connect, and manage. FreeRTOS extends the FreeRTOS kernel, a popular open
source operating system for microcontrollers, with software libraries that make it easy to securely connect
ke
the small, low-power devices to AWS cloud services like AWS IoT Core or to more powerful edge devices
running AWS IoT Greengrass.
-to
Amazon FSx
Amazon FSx provides third-party file systems. Amazon FSx provides the customers with the native
compatibility of third-party file systems with feature sets for workloads such as Windows-based storage,
m
high-performance computing (HPC), machine learning, and electronic design automation (EDA). The
customers don’t have to worry about managing file servers and storage, as Amazon FSx automates the
r
Gw
time-consuming administration tasks such as hardware provisioning, software configuration, patching,
and backups. Amazon FSx integrates the file systems with cloud-native AWS services, making them even
A7
more useful for a broader set of workloads.
Amazon S3 Glacier
Amazon S3 Glacier is an archival storage solution for data that is infrequently accessed for which retrieval
7
times of several hours are suitable. Data in Amazon S3 Glacier is stored as an archive. Archives in Amazon
g1
S3 Glacier can be created or deleted, but archives cannot be modified. Amazon S3 Glacier archives are
organized in vaults. All vaults created have a default permission policy that only permits access by the
account creator or users that have been explicitly granted permission. Amazon S3 Glacier enables
Rw
customers to set access policies on their vaults for users within their AWS Account. User policies can
express access criteria for Amazon S3 Glacier on a per vault basis. Customers can enforce Write Once Read
Many (WORM) semantics for users through user policies that forbid archive deletion.
ab
AWS Global Accelerator
AWS Global Accelerator is a networking service that improves the availability and performance of the
applications that customers offer to their global users. AWS Global Accelerator also makes it easier to
gv
manage customers’ global applications by providing static IP addresses that act as a fixed entry point to
customer applications hosted on AWS which eliminates the complexity of managing specific IP addresses
for different AWS Regions and AZs.
e9
AWS Glue
AWS Glue is an extract, transform, and load (ETL) service that makes it easy for customers to prepare and
m
load their data for analytics. The customers can create and run an ETL job with a few clicks in the AWS
Management Console.
kc
scientists to clean and normalize data to prepare it for analytics and machine learning. Customers can
choose from pre-built transformations to automate data preparation tasks, all without the need to write
EK
any code.
Amazon GuardDuty
zz
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and
unauthorized behavior to protect the customers’ AWS accounts and workloads. With the cloud, the
collection and aggregation of account and network activities is simplified, but it can be time consuming
n-
for security teams to continuously analyze event log data for potential threats. With GuardDuty, the
customers now have an intelligent and cost-effective option for continuous threat detection in the AWS
ke
Cloud.
AWS HealthImaging is a service that helps healthcare and life science organizations and their software
partners to store, analyze, and share medical imaging data at petabyte scale. With HealthImaging,
customers can reduce the total cost of ownership (TCO) of their medical imaging applications up to 40%
m
by running their medical imaging applications from a single copy of patient imaging data in the cloud. With
sub-second image retrieval latencies for active and archive data, customers can realize the cost savings of
r
Gw
the cloud without sacrificing performance at the point-of-care. HealthImaging removes the burden of
managing infrastructure for customer imaging workflows so that they can focus on delivering quality
A7
patient care.
AWS HealthLake
AWS HealthLake is a service offering healthcare and life sciences companies a complete view of individual
7
or patient population health data for query and analytics at scale. Using the HealthLake APIs, health
g1
organizations can easily copy health data, such as imaging medical reports or patient notes, from on-
premises systems to a secure data lake in the cloud. HealthLake uses machine learning (ML) models to
automatically understand and extract meaningful medical information from the raw data, such as
Rw
medications, procedures, and diagnoses. HealthLake organizes and indexes information and stores it in
the Fast Healthcare Interoperability Resources (FHIR) industry standard format to provide a complete view
of each patient's medical history.
ab
AWS HealthOmics (Effective August 15, 2023)
AWS HealthOmics helps Healthcare and Life Sciences organizations process, store, and analyze genomics
and other omics data at scale. The service supports a wide range of use cases, including DNA and RNA
gv
sequencing (genomics and transcriptomics), protein structure prediction (proteomics), and more. By
simplifying infrastructure management for customers and removing the undifferentiated heavy lifting,
HealthOmics allows customers to generate deeper insights from their omics data, improve healthcare
e9
outcomes, and advance scientific discoveries.
HealthOmics is comprised of three service components. Omics Storage efficiently ingests raw genomic
m
data into the Cloud, and it uses domain-specific compression to offer attractive storage prices to
customers. It also offers customers the ability to seamlessly access their data from various compute
kc
analyze at scale.
EK
(authentication) and what resources they can use and in what ways (authorization). Customers can grant
other people permission to administer and use resources in their AWS account without having to share
their password or access key. Customers can grant different permissions to different people for different
n-
resources. Customers can use IAM features to. securely give applications that run on EC2 instances the
credentials that they need in order to access other AWS resources, like S3 buckets and RDS or DynamoDB
ke
databases.
Amazon Inspector is an automated vulnerability management service that continually scans AWS
workloads for software vulnerabilities and unintended network exposure. Amazon Inspector removes the
operational overhead associated with deploying and configuring a vulnerability management solution by
m
allowing customers to deploy Amazon Inspector across all accounts with a single step.
r
Gw
Amazon Inspector Classic
Amazon Inspector Classic is an automated security assessment service for customers seeking to improve
A7
the security and compliance of applications deployed on AWS. Amazon Inspector Classic automatically
assesses applications for vulnerabilities or deviations from leading practices. After performing an
assessment, Amazon Inspector Classic produces a detailed list of security findings prioritized by level of
severity.
7
g1
AWS IoT Core
AWS IoT Core is a managed cloud service that lets connected devices easily and securely interact with
cloud applications and other devices. AWS IoT Core provides secure communication and data processing
Rw
across different kinds of connected devices and locations so that customers can easily build IoT
applications such as industrial solutions and connected home solutions.
ab
AWS IoT Device Defender is a security service that allows customers to audit the configuration of their
devices, monitor connected devices to detect abnormal behavior, and mitigate security risks. It gives
customers the ability to enforce consistent security policies across their AWS IoT device fleet and respond
gv
quickly when devices are compromised. AWS IoT Device Defender provides tools to identify security issues
and deviations from best practices. AWS IoT Device Defender can audit device fleets to ensure they adhere
to security best practices and detect abnormal behavior on devices.
e9
AWS IoT Device Management
AWS IoT Device Management provides customers with the ability to securely onboard, organize, and
m
remotely manage IoT devices at scale. With AWS IoT Device Management, customers can register their
connected devices individually or in bulk and manage permissions so that devices remain secure.
kc
Customers can also organize their devices, monitor and troubleshoot device functionality, query the state
of any IoT device in the fleet, and send firmware updates over-the-air (OTA). AWS IoT Device Management
I6
is agnostic to device type and OS, so customers can manage devices from constrained microcontrollers to
connected cars all with the same service. AWS IoT Device Management allows customers to scale their
EK
fleets and reduce the cost and effort of managing large and diverse IoT device deployments.
AWS IoT TwinMaker makes it easier for developers to create digital twins of real-world systems such as
buildings, factories, industrial equipment, and production lines. AWS IoT TwinMaker provides the tools
customers need to build digital twins to help them optimize building operations, increase production
n-
output, and improve equipment performance. With the ability to use existing data from multiple sources,
create virtual representations of any physical environment, and combine existing 3D models with real-
ke
world data, customers can now harness digital twins to create a holistic view of their operations faster
and with less effort.
-to
on a motor. Customers can select the relevant data sources to ingest, define the logic for each event using
simple ‘if-then-else’ statements, and select the alert or custom action to trigger when an event occurs.
r
Gw
IoT Events continuously monitors data from multiple IoT sensors and applications, and it integrates with
other services, such as AWS IoT Core, to enable early detection and unique insights into events. IoT Events
A7
automatically triggers alerts and actions in response to events based on the logic defined to resolve issues
quickly, reduce maintenance costs, and increase operational efficiency.
7
AWS IoT Greengrass seamlessly extends AWS to edge devices so they can act locally on the data they
g1
generate, while still using the cloud for management, analytics, and durable storage. With AWS IoT
Greengrass, connected devices can run AWS Lambda functions, execute predictions based on machine
learning models, keep device data in sync, and communicate with other devices securely – even when not
Rw
connected to the Internet.
ab
thousands of sensor data streams across multiple industrial facilities. AWS IoT SiteWise includes software
that runs on a gateway device that sits onsite in a facility, continuously collects the data from a historian
or a specialized industrial server, and sends it to the AWS Cloud. With the service, customers can skip
gv
months of developing undifferentiated data collection and cataloging solutions, and focus on using their
data to detect and fix equipment issues, spot inefficiencies, and improve production output.
e9
Amazon Kendra
Amazon Kendra is an intelligent search service powered by machine learning. Kendra reimagines
enterprise search for customer websites and applications so employees and customers can easily find
m
content, even when it's scattered across multiple locations and content repositories.
kc
to encrypt data directly submitted to the service. KMS keys can also be used to protect other types of
keys, Data Keys, which are created by the service and returned to the user’s application for local use.
EK
AWS KMS only creates and returns data keys to users; the service does not store or manage data keys.
AWS KMS is integrated with several AWS services so that users can request that resources in those
zz
services are encrypted with unique data keys provisioned by KMS that are protected by a KMS key the
user chooses at the time the resource is created (Control AWSCA-4.6). See in-scope services integrated
with KMS at https://aws.amazon.com/kms/. Integrated services use the data keys from AWS KMS. Data
n-
keys provisioned by AWS KMS are encrypted with a 256-bit key unique to the customer’s account under
a defined mode of AES – Advanced Encryption Standard (Control AWSCA-4.7).
ke
When a customer requests AWS KMS to create a KMS key, the service creates a key ID for the KMS key
and key material, referred to as a backing key, which is tied to the key ID of the KMS key. The 256-bit
-to
backing key can only be used for encrypt or decrypt operations by the service (Control AWSCA-4.10). KMS
will generate an associated key ID if a customer chooses to import their own key. If the customer chooses
to enable key rotation for a KMS key with a backing key that the service generated, AWS KMS will create
m
a new version of the backing key for each rotation event, but the key ID remains the same (Control
AWSCA-4.11). All future encrypt operations under the key ID will use the newest backing key, while all
r
Gw
previous versions of backing keys are retained to decrypt ciphertexts created under the previous version
of the key. Backing keys and customer-imported keys are encrypted under AWS-controlled keys when
A7
created/imported and they are only ever stored on disk in encrypted form.
All requests to AWS KMS APIs are logged and available in the AWS CloudTrail of the requester and the
owner of the key. The logged requests provide information about who made the request, under which
7
KMS key, and describes information about the AWS resource that was protected through the use of the
g1
KMS key. These log events are visible to the customer after turning on AWS CloudTrail in their account
(Control AWSCA-4.8).
Rw
AWS KMS creates and manages multiple distributed replicas of KMS keys and key metadata automatically
to enable high availability and data durability. KMS keys themselves are regional objects; KMS keys can
only be used in the AWS region in which they were created. KMS keys are only stored on persistent disk
in encrypted form and in two separate storage systems to ensure durability. When a KMS key is needed
ab
to fulfill an authorized customer request, it is retrieved from storage, decrypted on one of many AWS KMS
hardened security modules (HSM) in the region, then used only in memory to execute the cryptographic
operation (e.g., encrypt or decrypt). Future requests to use the KMS key each require the decryption of
gv
the KMS key in memory for another one-time use.
AWS KMS endpoints are only accessible via TLS using the following cipher suites that support forward
e9
secrecy (Control AWSCA-4.9):
• AES_256_GCM_SHA384
m
• AES_128_GCM_SHA256
kc
• CHACHA20_POLY1305_SHA256
• ECDHE_RSA_WITH_AES_256_GCM_SHA384
I6
• ECDHE_RSA_WITH_AES_128_GCM_SHA256
• ECDHE_RSA_WITH_AES_256_CBC_SHA384
EK
• ECDHE_RSA_WITH_AES_256_CBC_SHA
• ECDHE_RSA_WITH_AES_128_CBC_SHA256
zz
• ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
• DHE_RSA_WITH_AES_256_CBC_SHA256
n-
• DHE_RSA_WITH_AES_128_CBC_SHA256
ke
• DHE_RSA_WITH_AES_256_CBC_SHA
• DHE_RSA_WITH_AES_128_CBC_SHA
-to
By design, no one can gain access to KMS key material. KMS keys are only ever present on hardened
security modules for the amount of time needed to perform cryptographic operations under them. AWS
m
employees have no tools to retrieve KMS keys from these hardened security modules. In addition, multi-
r
Gw
party access controls are enforced for operations on these hardened security modules that involve
changing the software configuration or introducing new hardened security modules into the service.
A7
These multi-party access controls minimize the possibility of an unauthorized change to the hardened
security modules, exposing key material outside the service, or allowing unauthorized use of customer
keys (Control AWSCA-4.5). Additionally, key material used for disaster recovery processes by KMS are
physically secured such that no AWS employee can gain access (Control AWSCA-4.12). Access attempts
7
to recovery key materials are reviewed by authorized operators on a periodic basis (Control AWSCA-4.13).
g1
Roles and responsibilities for those cryptographic custodians with access to systems that store or use key
material are formally documented and acknowledged (Control AWSCA-1.6).
Rw
Amazon Keyspaces (for Apache Cassandra)
Amazon Keyspaces (for Apache Cassandra) is a scalable, highly available Apache Cassandra–compatible
database service. With Amazon Keyspaces, customers can run Cassandra workloads on AWS using the
same Cassandra application code and developer tools that customers use today. Amazon Keyspaces is
ab
serverless and gives customers the performance, elasticity, and enterprise features customers need to
operate business-critical Cassandra workloads at scale.
gv
Amazon Managed Service for Apache Flink
Amazon Managed Service for Apache Flink is an easy way for customers to analyze streaming data, gain
actionable insights, and respond to business and customer needs in real time. Amazon Managed Service
e9
for Apache Flink reduces the complexity of building, managing, and integrating streaming applications
with other AWS services. SQL users can easily query streaming data or build entire streaming applications
using templates and an interactive SQL editor. Java developers can quickly build sophisticated streaming
m
applications using open source Java libraries and AWS integrations to transform and analyze data in real-
time.
kc
capture, transform, and load streaming data into Amazon S3, Amazon Redshift, and Amazon OpenSearch
Service enabling near real-time analytics with existing business intelligence tools and dashboards
EK
customers are already using today. The service automatically scales to match the throughput of the
customers’ data and requires no ongoing administration. It can also batch, compress, transform, and
encrypt the data before loading it, minimizing the amount of storage used at the destination and
zz
increasing security.
Amazon Kinesis Data Streams is a massively scalable and durable real-time data streaming service. Kinesis
Data Streams can continuously capture gigabytes of data per second from hundreds of thousands of
ke
sources such as website clickstreams, database event streams, financial transactions, social media feeds,
IT logs and location-tracking events. The collected data is available in milliseconds to enable real-time
analytics use cases such as real-time dashboards, real-time anomaly detection, dynamic pricing and more.
-to
analytics, machine learning (ML), playback, and other processing. Kinesis Video Streams automatically
provisions and elastically scales the infrastructure needed to ingest streaming video data from millions of
r
Gw
devices. It also durably stores, encrypts, and indexes video data in the streams, and allows the customers
to access their data through easy-to-use APIs. Kinesis Video Streams enables the customers to playback
A7
video for live and on-demand viewing, and quickly build applications that take advantage of computer
vision and video analytics.
7
Amazon Location Service makes it easy for developers to add location functionality to applications without
g1
compromising data security and user privacy. With Amazon Location Service, customers can build
applications that provide maps and points of interest, convert street addresses into geographic
coordinates, calculate routes, track resources, and trigger actions based on location. Amazon Location
Rw
Service uses high-quality geospatial data to provide maps, places, routes, tracking, and geofencing.
ab
AWS Lake Formation is an integrated data lake service that makes it easy for customers to ingest, clean,
catalog, transform, and secure their data and make it available for analysis and ML. AWS Lake Formation
gives customers a central console where they can discover data sources, set up transformation jobs to
gv
move data to an Amazon Simple Storage Service (S3) data lake, remove duplicates and match records,
catalog data for access by analytic tools, configure data access and security policies, and audit and control
access from AWS analytic and ML services. Lake Formation automatically manages access to the registered
e9
data in Amazon S3 through services including AWS Glue, Amazon Athena, Amazon Redshift, Amazon
QuickSight, and Amazon EMR to ensure compliance with customer defined policies. With AWS Lake
Formation, customers can configure and manage their data lake without manually integrating multiple
m
underlying AWS services.
AWS Lambda
kc
AWS Lambda lets customers run code without provisioning or managing servers on their own. AWS
Lambda uses a compute fleet of Amazon Elastic Compute Cloud (Amazon EC2) instances across multiple
I6
AZs in a region, which provides the high availability, security, performance, and scalability of the AWS
infrastructure.
EK
Amazon Lex
Amazon Lex is a service for building conversational interfaces into any application using voice and text.
Amazon Lex provides the advanced deep learning functionalities of automatic speech recognition (ASR)
zz
for converting speech to text, and natural language understanding (NLU) to recognize the intent of the
text, to enable customers to build applications with highly engaging user experiences and lifelike
conversational interactions. Amazon Lex scales automatically, so customers do not need to worry about
n-
managing infrastructure.
ke
emulate the terms of their licensing agreements, and then enforces these rules when an instance of EC2
gets launched. Customer administrators can use these rules to limit licensing violations, such as using
more licenses than an agreement stipulates or reassigning licenses to different servers on a short-term
m
basis. The rules in AWS License Manager also enable customers to limit a licensing breach by stopping the
r
Gw
instance from launching or by notifying the customer administrators about the infringement. Customer
administrators gain control and visibility of all their licenses with the AWS License Manager dashboard
A7
and reduce the risk of non-compliance, misreporting, and additional costs due to licensing overages.
AWS License Manager integrates with AWS services to simplify the management of licenses across
multiple AWS accounts, IT catalogs, and on-premises, through a single AWS account.
7
g1
Amazon Macie
Amazon Macie is a data security and data privacy service that uses machine learning and pattern matching
to help customers discover, monitor, and protect their sensitive data in AWS.
Rw
Macie automates the discovery of sensitive data, such as personally identifiable information (PII) and
financial data, to provide customers with a better understanding of the data that organization stores in
Amazon Simple Storage Service (Amazon S3). Macie also provides customers with an inventory of the S3
ab
buckets, and it automatically evaluates and monitors those buckets for security and access control. Within
minutes, Macie can identify and report overly permissive or unencrypted buckets for the organization.
gv
If Macie detects sensitive data or potential issues with the security or privacy of customer content, it
creates detailed findings for customers to review and remediate as necessary. Customers can review and
analyze these findings directly in Macie, or monitor and process them by using other services, applications,
e9
and systems.
AWS Mainframe Modernization is an elastic mainframe service and set of development tools for migrating
and modernizing mainframe and legacy workloads. Using Mainframe Modernization, system integrators
kc
can help discover their mainframe and legacy workloads, assess and analyze migration readiness, and plan
migration and modernization projects. Once planning is complete, customers can use the Mainframe
Modernization built-in development tools to replatform or refactor their mainframe and legacy
I6
workloads, test workload performance and functionality, and migrate their data to AWS.
EK
and alarm on their metrics, logs, and traces collected from multiple data sources in their observability
system, including AWS, third-party ISVs, and other resources across their IT portfolio. Amazon Managed
Grafana offloads the operational management of Grafana by automatically scaling compute and database
n-
infrastructure as usage demands increase, with automated version updates and security
patching. Amazon Managed Grafana natively integrates with AWS services so customers can securely add,
ke
query, visualize, and analyze their AWS data across multiple accounts and regions with a few clicks in the
AWS Console. Amazon Managed Grafana integrates with AWS IAM Identity Center and supports Security
Assertion Markup Language (SAML) 2.0, so customers can set up user access to specific dashboards and
-to
AWS Managed Services provides ongoing management of a customer’s AWS infrastructure. AWS
Managed Services automates common activities such as change requests, monitoring, patch
r
Gw
management, security, and backup services, and provides full-lifecycle services to provision, run, and
support a customer’s infrastructure.
A7
Amazon Managed Service for Prometheus
Amazon Managed Service for Prometheus is a Prometheus-compatible monitoring and alerting service
that facilitates monitoring of containerized applications and infrastructure at scale. The Cloud Native
7
Computing Foundation’s Prometheus project is an open source monitoring and alerting solution
g1
optimized for container environments. With Amazon Managed Service for Prometheus, customers can
use the open source Prometheus query language (PromQL) to monitor and alert on the performance of
containerized workloads, without having to scale and operate the underlying infrastructure. Amazon
Rw
Managed Service for Prometheus automatically scales the ingestion, storage, alerting, and querying of
operational metrics as workloads grow or shrink, and it is integrated with AWS security services to enable
fast and secure access to data.
ab
Amazon Managed Workflows for Apache Airflow (Amazon MWAA)
Amazon Managed Workflows for Apache Airflow is a service for Apache Airflow that lets customers use
their current, familiar Apache Airflow platform to orchestrate their workflows. Customers gain improved
gv
scalability, availability, and security without the operational burden of managing underlying
infrastructure. Amazon Managed Workflows for Apache Airflow orchestrates customer’s workflows using
Directed Acyclic Graphs (DAGs) written in Python. Customers provide Amazon Managed Workflows for
e9
Apache Airflow an Amazon Simple Storage Service (S3) bucket where customer’s DAGs, plugins, and
Python requirements reside. Then customers can run and monitor their DAGs from the AWS Management
Console, a command line interface (CLI), a software development kit (SDK), or the Apache Airflow user
m
interface (UI).
kc
platform for building real-time streaming data pipelines and applications. With Amazon MSK, customers
can use Apache Kafka APIs to populate data lakes, stream changes to and from databases, and power
EK
Amazon MemoryDB is compatible with Redis, an open source data store, enabling customers to quickly
build applications using the same flexible Redis data structures, APIs, and commands that they already
ke
use today. With Amazon MemoryDB, all of the customer’s data is stored in memory, which enables the
customer to achieve microsecond read and single-digit millisecond write latency and high throughput.
Amazon MemoryDB also stores data durably across multiple AZs using a distributed transactional log to
-to
enable fast failover, database recovery, and node restarts. Delivering both in-memory performance and
Multi-AZ durability, Amazon MemoryDB can be used as a high-performance primary database for
microservices applications eliminating the need to separately manage both a cache and durable database.
mr
Gw
Amazon MQ
Amazon MQ is a managed message broker service for Apache ActiveMQ that sets up and operates
A7
message brokers in the cloud. Message brokers allow different software systems – often using different
programming languages, and on different platforms – to communicate and exchange information.
Messaging is the communications backbone that connects and integrates the components of distributed
applications, such as order processing, inventory management, and order fulfillment for e-commerce.
7
Amazon MQ manages the administration and maintenance of ActiveMQ, a popular open-source message
g1
broker.
Amazon Neptune
Rw
Amazon Neptune is a fast and reliable graph database service that makes it easy to build and run
applications that work with highly connected datasets. The core of Amazon Neptune is a purpose-built,
high-performance graph database engine optimized for storing billions of relationships and querying the
graph with milliseconds latency. Amazon Neptune supports popular graph models, Property Graph, and
ab
W3C's RDF, and their respective query languages Apache, TinkerPop Gremlin, and SPARQL, allowing
customers to easily build queries that efficiently navigate highly connected datasets. Neptune powers
graph use cases such as recommendation engines, fraud detection, knowledge graphs, drug discovery,
gv
and network security.
The dashboard displays relevant and timely information to help customers manage events in progress and
provides proactive notification to help customers plan for scheduled activities. With AWS Health
Dashboard, alerts are triggered by changes in the health of AWS resources, giving event visibility, and
I6
perimeter of customer VPC. This includes filtering traffic going to and coming from an internet gateway,
NAT gateway, or over VPN or AWS Direct Connect.
n-
operate OpenSearch cost effectively at scale. Amazon OpenSearch Service lets the customers pay only for
what they use – there are no upfront costs or usage requirements. With Amazon OpenSearch Service, the
customers get the ELK stack they need, without the operational overhead.
-to
mr
Gw
AWS OpsWorks Stacks
AWS OpsWorks Stacks is an application and server management service. OpsWorks Stacks lets customers
A7
manage applications and servers on AWS and on-premises. With OpsWorks Stacks, customers can model
their application as a stack containing different layers, such as load balancing, database, and application
server. They can deploy and configure Amazon EC2 instances in each layer or connect other resources
such as Amazon RDS databases. OpsWorks Stacks also lets customers set automatic scaling for their
7
servers based on preset schedules or in response to changing traffic levels, and it uses lifecycle hooks to
g1
orchestrate changes as their environment scales.
Rw
AWS OpsWorks for Chef Automate is a configuration management service that hosts Chef Automate, a
suite of automation tools from Chef for configuration management, compliance and security, and
continuous deployment. OpsWorks also maintains customers’ Chef server by automatically patching,
updating, and backing up customer servers. OpsWorks eliminates the need for customers to operate their
ab
own configuration management systems or worry about maintaining its infrastructure. OpsWorks gives
customers access to all of the Chef Automate features, such as configuration and compliance
management, which customers manage through the Chef console or command line tools like Knife. It also
gv
works seamlessly with customers’ existing Chef cookbooks.
AWS OpsWorks for Puppet Enterprise is a configuration management service that hosts Puppet
e9
Enterprise, a set of automation tools from Puppet for infrastructure and application management.
OpsWorks also maintains customers’ Puppet master server by automatically patching, updating, and
backing up customers’ servers. OpsWorks eliminates the need for customers to operate their own
m
configuration management systems or worry about maintaining its infrastructure. OpsWorks gives
customers’ access to all of the Puppet Enterprise features, which customers manage through the Puppet
kc
AWS Organizations
I6
AWS Organizations helps customers centrally govern their environment as customers grow and scale their
workloads on AWS. Whether customers are a growing startup or a large enterprise, Organizations helps
EK
customers to centrally manage billing; control access, compliance, and security; and share resources
across customer AWS accounts.
zz
Using AWS Organizations, customers can automate account creation, create groups of accounts to reflect
their business needs, and apply policies for these groups for governance. Customers can also simplify
billing by setting up a single payment method for all of their AWS accounts. Through integrations with
n-
other AWS services, customers can use Organizations to define central configurations and resource
sharing across accounts in their organization.
ke
AWS Outposts
AWS Outposts is a service that extends AWS infrastructure, AWS services, APIs and tools to any data
-to
center, co-location space, or an on-premises facility for a consistent hybrid experience. AWS Outposts is
ideal for workloads that require low latency access to on-premises systems, local data processing or local
data storage. Outposts offer the same AWS hardware infrastructure, services, APIs and tools to build and
m
run applications on premises and in the cloud. AWS compute, storage, database and other services run
locally on Outposts and customers can access the full range of AWS services available in the Region to
r
Gw
build, manage and scale on-premises applications. Service Link is established between Outposts and the
AWS region by use of a secured VPN connection over the public internet or AWS Direct Connect (Control
A7
AWSCA-3.17).
AWS Outposts are configured with a Nitro Security Key (NSK) which is designed to encrypt customer
content and give customers the ability to mechanically remove content from the device. Customer
7
content is cryptographically shredded if a customer removes the NSK from an Outpost device (Control
g1
AWSCA-7.9).
Additional information about Security in AWS Outposts, including the shared responsibility model, can be
Rw
found in the AWS Outposts User Guide.
ab
cryptography and key management functions that are usually provided by on-premises payment
hardware security modules (HSMs). This elastic, pay-as-you-go AWS API service allows credit, debit, and
payment processing applications to move to the cloud without the need for dedicated payment HSMs.
gv
AWS Private Certificate Authority e9
AWS Private Certificate Authority (CA) is a managed private CA service enables customers to easily and
securely manage the lifecycle of their private certificates. Private CA allows developers to be more agile
by providing them APIs to create and deploy private certificates programmatically. Customers also have
m
the flexibility to create private certificates for applications that require custom certificate lifetimes or
resource names. With Private CA, customers can create and manage private certificates for their
kc
connected resources in one place with a secure, pay as you go, managed private CA service.
Amazon Personalize
I6
Amazon Personalize is a machine learning service that makes it easy for developers to create
individualized recommendations for customers using their applications. Amazon Personalize makes it easy
EK
for developers to build applications capable of delivering a wide array of personalization experiences,
including specific product recommendations, personalized product re-ranking and customized direct
marketing. Amazon Personalize goes beyond rigid static rule- based recommendation systems and trains,
tunes, and deploys custom machine learning models to deliver highly customized recommendations to
zz
Amazon Pinpoint
Amazon Pinpoint helps customers engage with their customers by sending email, SMS, and mobile push
messages. The customers can use Amazon Pinpoint to send targeted messages (such as promotional alerts
ke
and customer retention campaigns), as well as direct messages (such as order confirmations and password
reset messages) to their customers.
-to
Amazon Polly
Amazon Polly is a service that turns text into lifelike speech, allowing customers to create applications
that talk, and build entirely new categories of speech-enabled products. Amazon Polly is a Text-to-
mr
Gw
Speech service that uses advanced deep learning technologies to synthesize speech that sounds like a
human voice.
A7
Amazon Quantum Ledger Database (QLDB)
Amazon Quantum Ledger Database (QLDB) is a ledger database that provides a transparent, immutable
and cryptographically verifiable transaction log owned by a central trusted authority. Amazon QLDB can
7
be used to track each and every application data change and maintains a complete and verifiable history
g1
of changes over time.
Amazon QuickSight
Rw
Amazon QuickSight is a fast, cloud-powered business analytics service that makes it easy to build
visualizations, perform ad-hoc analysis, and quickly get business insights from customers’ data. Using this
cloud-based service customers can connect to their data, perform advanced analysis, and create
visualizations and dashboards that can be accessed from any browser or mobile device.
ab
Amazon Redshift
Amazon Redshift is a data warehouse service to analyze data using a customer’s existing Business
gv
Intelligence (BI) tools. Amazon Redshift also includes Redshift Spectrum, allowing customers to directly
run SQL queries against Exabytes of unstructured data in Amazon S3.
e9
Amazon Rekognition
The easy-to-use Rekognition API allows customers to automatically identify objects, people, text, scenes,
and activities, as well as detect any inappropriate content. Developers can quickly build a searchable
m
content library to optimize media workflows, enrich recommendation engines by extracting text in
images, or integrate secondary authentication into existing applications to enhance end-user security.
kc
With a wide variety of use cases, Amazon Rekognition enables the customers to easily add the benefits of
computer vision to the business.
I6
database in the cloud. Amazon RDS manages backups, software patching, automatic failure detection,
and recovery. It provides cost-efficient and resizable capacity while automating time-consuming
administration tasks such as hardware provisioning, database setup, patching and backups.
zz
related outages by uncovering resiliency weaknesses through continuous resiliency assessment and
validation. AWS Resilience Hub can also provide Standard Operating Procedures (SOPs) to help recover
ke
within their organization or organizational units (OUs) in AWS Organizations, and with IAM roles and IAM
users for supported resource types. Customers are able to use AWS Resource Access Manager to share
r
Gw
transit gateways, subnets, AWS License Manager license configurations, Amazon Route 53 Resolver rules,
and more resource types.
A7
AWS Resource Groups
AWS Resource Groups is a service that helps customers organize AWS resources into logical groupings.
These groups can represent an application, a software component, or an environment. Resource groups
7
can include more than fifty additional resource types, bringing the overall number of supported resource
g1
types to seventy-seven. Some of these new resource types include Amazon DynamoDB tables, AWS
Lambda functions, AWS CloudTrail trails, and many more. Customers can now create resource groups that
accurately reflect their applications, and take action against those groups, rather than against individual
Rw
resources.
AWS RoboMaker
AWS RoboMaker is a service that makes it easy to develop, test, and deploy intelligent robotics
ab
applications at scale. RoboMaker extends the most widely used open-source robotics software
framework, Robot Operating System (ROS), with connectivity to cloud services. This includes AWS
machine learning services, monitoring services, and analytics services that enable a robot to stream data,
gv
navigate, communicate, comprehend, and learn. RoboMaker provides a robotics development
environment for application development, a robotics simulation service to accelerate application testing,
and a robotics fleet management service for remote application deployment, update, and management.
e9
Amazon Route 53
Amazon Route 53 provides managed Domain Name System (DNS) web service. Amazon Route 53 connects
m
user requests to infrastructure running both inside and outside of AWS. Customers can use Amazon Route
53 to configure DNS health checks to route traffic to healthy endpoints or to independently monitor the
kc
health of their application and its endpoints. Amazon Route 53 enables customers to manage traffic
globally through a variety of routing types, including Latency Based Routing, Geo DNS, and Weighted
Round Robin, all of these routing types can be combined with DNS Failover. Amazon Route 53 also offers
I6
Domain Name Registration; customers can purchase and manage domain names such as example.com
and Amazon Route 53 will automatically configure DNS settings for their domains. Amazon Route 53 sends
EK
automated requests over the internet to a resource, such as a web server, to verify that it is reachable,
available, and functional. Customers also can choose to receive notifications when a resource becomes
unavailable and choose to route internet traffic away from unhealthy resources.
zz
Amazon SageMaker (excludes Studio Lab, Public Workforce and Vendor Workforce for all features)
Amazon SageMaker is a platform that enables developers and data scientists to quickly and easily build,
n-
train, and deploy machine learning models at any scale. Amazon SageMaker removes the barriers that
typically “slow down” developers who want to use machine learning.
ke
Amazon SageMaker removes the complexity that holds back developer success with the process of
building, training, and deploying machine learning models at scale. Amazon SageMaker includes modules
-to
that can be used together or independently to build, train, and deploy a customer’s machine learning
models.
mr
Gw
AWS Secrets Manager
AWS Secrets Manager helps customers protect secrets needed to access their applications, services, and
A7
IT resources. The service enables customers to easily rotate, manage, and retrieve database credentials,
API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call
to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets
7
Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon
DocumentDB. The service is also extensible to other types of secrets, including API keys and OAuth
g1
tokens. In addition, Secrets Manager allows customers to control access to secrets using fine-grained
permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and
on-premises.
Rw
AWS Security Hub
AWS Security Hub gives customers a comprehensive view of their high-priority security alerts and
ab
compliance status across AWS accounts. There are a range of powerful security tools at customers’
disposal, from firewalls and endpoint protection to vulnerability and compliance scanners. With Security
Hub, customers can now have a single place that aggregates, organizes, and prioritizes their security
gv
alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector Classic, and
Amazon Macie, as well as from AWS Partner solutions. Findings are visually summarized on integrated
dashboards with actionable graphs and tables.
e9
AWS Server Migration Service (SMS) (Deprecated April 1, 2024)
AWS Server Migration Service (SMS) is an agentless service which makes it easier and faster for customers
m
to migrate thousands of on-premises workloads to AWS. AWS SMS allows customers to automate,
schedule, and track incremental replications of live server volumes, making it easier for customers to
kc
The AWS Serverless Application Repository is a managed repository for serverless applications. It enables
teams, organizations, and individual developers to store and share reusable applications, and easily
EK
assemble and deploy serverless architectures in powerful new ways. Using the Serverless Application
Repository, customers do not need to clone, build, package, or publish source code to AWS before
deploying it. Instead, customers can use pre-built applications from the Serverless Application Repository
in their serverless architectures, helping customers reduce duplicated work, ensure organizational best
zz
practices, and get to market faster. Integration with AWS Identity and Access Management (IAM) provides
resource-level control of each application, enabling customers to publicly share applications with
n-
AWS Service Catalog allows customers to create and manage catalogs of IT services that are approved for
use on AWS. These IT services can include everything from virtual machine images, servers, software, and
-to
databases to complete multi-tier application architectures. AWS Service Catalog allows customers to
centrally manage commonly deployed IT services, and helps customers achieve consistent governance
and meet their compliance requirements, while enabling users to quickly deploy only the approved IT
services they need.
mr
Gw
AWS Shield
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
A7
applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations
that minimize application downtime and latency, so there is no need to engage AWS Support to benefit
from DDoS protection.
7
Amazon Simple Email Service (SES)
g1
Amazon Simple Email Service (SES) is a cost-effective, flexible and scalable email service that enables
developers to send mail from within any application. Customers can configure Amazon SES to support
several email use cases including transactional, marketing, or mass email communications. Amazon SES'
Rw
flexible IP deployment and email authentication options help drive higher deliverability and protect
sender reputation, while sending analytics to measure impact of each email. With Amazon SES, customers
can send email securely, globally and at scale.
ab
Amazon Simple Notification Service (SNS)
Amazon Simple Notification Service (SNS) is a web service to set up, operate, and send notifications. It
provides developers the capability to publish messages from an application and deliver them to
gv
subscribers or other applications. Amazon SNS follows the “publish-subscribe” (pub-sub) messaging
paradigm, with notifications being delivered to clients using a “push” mechanism. Using SNS requires
defining a "Topic", setting policies on access and delivery of the Topic, subscribing consumers and
e9
designating delivery endpoints, and publishing messages to a Topic. Administrators define a Topic as an
access point for publishing messages and allowing customers to subscribe to notifications. Security
policies are applied to Topics to determine who can publish, who can subscribe, and to designate protocols
m
supported.
kc
between distributed components of their applications that perform different tasks, without losing
messages or requiring each component to be always available. Amazon SQS allows customers to build an
EK
automated workflow, working in close conjunction with Amazon EC2 and the other AWS infrastructure
web services.
zz
Amazon SQS’ main components consist of a frontend request-router fleet, a backend data-storage fleet,
a metadata cache fleet, and a dynamic workload management fleet. User queues are mapped to one or
more backend clusters. Requests to read, write, or delete messages come into the frontends. The
n-
frontends contact the metadata cache to find out which backend cluster hosts that queue and then
connect to nodes in that cluster to service the request.
ke
For authorization, Amazon SQS has its own resource-based permissions system that uses policies written
in the same language used for AWS IAM policies. User permissions for any Amazon SQS resource can be
-to
given either through the Amazon SQS policy system or the AWS IAM policy system, which is authorized
by AWS Identity and Access Management Service. Such policies with a queue are used to specify which
AWS Accounts have access to the queue as well as the type of access and conditions.
mr
Gw
Amazon Simple Storage Service (S3)
Amazon Simple Storage Service (S3) provides a web services interface that can be used to store and
A7
retrieve data from anywhere on the web. To provide customers with the flexibility to determine how,
when, and to whom they wish to expose the information they store in AWS, Amazon S3 APIs provide both
bucket and object-level access controls, with defaults that only permit authenticated access by the bucket
and/or object creator. Unless a customer grants anonymous access, the first step before a user can access
7
Amazon S3 is to be authenticated with a request signed using the user’s secret access key.
g1
An authenticated user can read an object only if the user has been granted read permissions in an Access
Control List (ACL) at the object level. An authenticated user can list the keys and create or overwrite
Rw
objects in a bucket only if the user has been granted read and write permissions in an ACL at the bucket
level. Bucket and object-level ACLs are independent; an object does not inherit ACLs from its bucket.
Permissions to read or modify the bucket or object ACLs are themselves controlled by ACLs that default
to creator-only access. Therefore, the customer maintains full control over who has access to its data.
ab
Customers can grant access to their Amazon S3 data to other AWS users by AWS Account ID or email, or
DevPay Product ID. Customers can also grant access to their Amazon S3 data to all AWS users or to
everyone (enabling anonymous access).
gv
Network devices supporting Amazon S3 are configured to only allow access to specific ports on other
Amazon S3 server systems (Control AWSCA-3.7). External access to data stored in Amazon S3 is logged
e9
and the logs are retained for at least 90 days, including relevant access request information, such as the
data accessor IP address, object, and operation (Control AWSCA-3.8).
m
manages the execution flow such that tasks are load balanced across the workers, inter-task dependencies
are respected, concurrency is handled appropriately, and child workflows are executed.
EK
Amazon SWF enables applications to be built by orchestrating tasks coordinated by a decider process.
Tasks represent logical units of work and are performed by application components that can take any
zz
form, including executable code, scripts, web service calls, and human actions.
Developers implement workers to perform tasks. They run their workers either on cloud infrastructure,
n-
such as Amazon EC2, or off-cloud. Tasks can be long-running, may fail, may timeout and may complete
with varying throughputs and latencies. Amazon SWF stores tasks for workers, assigns them when workers
ke
are ready, tracks their progress, and keeps their latest state, including details on their completion. To
orchestrate tasks, developers write programs that get the latest state of tasks from Amazon SWF and use
it to initiate subsequent tasks in an ongoing manner. Amazon SWF maintains an application’s execution
-to
state durably so that the application can be resilient to failures in individual application components.
Amazon SWF provides auditability by giving customers visibility into the execution of each step in the
m
application. The Management Console and APIs let customers monitor all running executions of the
application. The customer can zoom in on any execution to see the status of each task and its input and
r
Gw
output data. To facilitate troubleshooting and historical analysis, Amazon SWF retains the history of
executions for any number of days that the customer can specify, up to a maximum of 90 days.
A7
The actual processing of tasks happens on compute resources owned by the end customer. Customers
are responsible for securing these compute resources, for example if a customer uses Amazon EC2 for
workers then they can restrict access to their instances in Amazon EC2 to specific AWS IAM users. In
7
addition, customers are responsible for encrypting sensitive data before it is passed to their workflows
g1
and decrypting it in their workers.
Amazon SimpleDB
Rw
Amazon SimpleDB is a non-relational data store that allows customers to store and query data items via
web services requests. Amazon SimpleDB then creates and manages multiple geographically distributed
replicas of data automatically to enable high availability and data durability.
ab
Data in Amazon SimpleDB is stored in domains, which are similar to database tables except that functions
cannot be performed across multiple domains. Amazon SimpleDB APIs provide domain-level controls that
only permit authenticated access by the domain creator.
gv
Data stored in Amazon SimpleDB is redundantly stored in multiple physical locations as part of normal
operation of those services. Amazon SimpleDB provides object durability by protecting data across
e9
multiple AZs on the initial write and then actively doing further replication in the event of device
unavailability or detected bit-rot.
m
and business applications. Customers can control SSO access and user permissions across all AWS
accounts in AWS Organizations. Customers can also administer access to popular business applications
and custom applications that support Security Assertion Markup Language (SAML) 2.0. In addition, AWS
I6
IAM Identity Center offers a user portal where users can find all their assigned AWS accounts, business
applications, and custom applications in one place.
EK
AWS Signer
AWS Signer is a managed code-signing service to ensure the trust and integrity of customer code.
zz
Customers validate code against a digital signature to confirm that the code is unaltered and from a
trusted publisher. With AWS Signer, customer security administrators have a single place to define their
signing environment, including what AWS Identity and Access Management (IAM) role can sign code and
n-
in what regions. AWS Signer manages the code-signing certificate public and private keys and enables
central management of the code-signing lifecycle.
ke
AWS Snowball
Snowball is a petabyte-scale data transport solution that uses secure appliances to transfer large amounts
-to
of data into and out of the AWS cloud. Using Snowball addresses common challenges with large-scale data
transfers including high network costs, long transfer times, and security concerns. Transferring data with
Snowball is simple and secure.
mr
Gw
AWS Snowball Edge
AWS Snowball Edge is a 100TB data transfer device with on-board storage and compute capabilities.
A7
Customers can use Snowball Edge to move large amounts of data into and out of AWS, as a temporary
storage tier for large local datasets, or to support local workloads in remote or offline locations. Snowball
Edge connects to customers’ existing applications and infrastructure using standard storage interfaces,
streamlining the data transfer process and minimizing setup and integration. Snowball Edge can cluster
7
together to form a local storage tier and process customers’ data on-premises, helping ensure their
g1
applications continue to run even when they are not able to access the cloud.
Rw
AWS Snowmobile is an Exabyte-scale data transfer service used to move extremely large amounts of data
to AWS. Customers can transfer their Exabyte data via a 45-foot long ruggedized shipping container, pulled
by a semi-trailer truck. Snowmobile makes it easy to move massive volumes of data to the cloud, including
video libraries, image repositories, or even a complete data center migration. After a customer’s data is
ab
loaded, Snowmobile is driven back to AWS where their data is imported into Amazon S3 or Amazon
Glacier.
gv
AWS Step Functions
AWS Step Functions is a web service that enables customers to coordinate the components of distributed
applications and microservices using visual workflows. Customers can build applications from individual
e9
components that each perform a discrete function, or task, allowing them to scale and change applications
quickly. Step Functions provides a reliable way to coordinate components and step through the functions
of a customer’s application. Step Functions provides a graphical console to visualize the components of a
m
customer’s application as a series of steps. It automatically triggers and tracks each step, and retries when
there are errors, so the customer’s application executes in order and as expected, every time. Step
kc
Functions logs the state of each step, so when things do go wrong, customers can diagnose and debug
problems quickly.
I6
storage. The service enables organizations to store data in AWS’ highly durable cloud storage services:
Amazon S3 and Amazon Glacier.
zz
AWS Storage Gateway backs up data off-site to Amazon S3 in the form of Amazon EBS snapshots. AWS
Storage Gateway transfers data to AWS and stores this data in either Amazon S3 or Amazon Glacier,
depending on the use case and type of gateway used. There are three types of gateways: Tape, File, and
n-
Volume Gateways. The Tape Gateway allows customers to store more frequently accessed data in Amazon
S3 and less frequently accessed data in Amazon Glacier.
ke
The File Gateway allows customers to copy data to S3 and have those files appear as individual objects in
S3. Volume gateways store data directly in Amazon S3 and allow customers to snapshot their data so that
-to
they can access previous versions of their data. These snapshots are captured as Amazon EBS Snapshots,
which are also stored in Amazon S3. Both Amazon S3 and Amazon Glacier redundantly store these
snapshots on multiple devices across multiple facilities, detecting and repairing any lost redundancy. The
m
Amazon EBS snapshot provides a point-in-time backup that can be restored off-cloud or on a gateway
r
Gw
running in Amazon EC2, or used to instantiate new Amazon EBS volumes. Data is stored within a single
region that customers specify.
A7
AWS Systems Manager
AWS Systems Manager gives customers the visibility and control to their infrastructure on AWS. AWS
Systems Manager provides customers a unified user interface so that customers can view their
7
operational data from multiple AWS services, and it allows customers to automate operational tasks
g1
across the AWS resources.
With AWS Systems manager, customers can group resources, like Amazon EC2 instances, Amazon S3
Rw
buckets, or Amazon RDS instances, by application, view operational data for monitoring and
troubleshooting, and take action on groups of resources.
Amazon Textract
ab
Amazon Textract automatically extracts text and data from scanned documents. With Textract customers
can quickly automate document workflows, enabling customers to process large volumes of document
pages in a short period of time. Once the information is captured, customers can take action on it within
gv
their business applications to initiate next steps for a loan application or medical claims processing.
Additionally, customers can create search indexes, build automated approval workflows, and better
maintain compliance with document archival rules by flagging data that may require redaction.
e9
Amazon Timestream
Amazon Timestream is a fast, scalable, and serverless time series database service for IoT and operational
m
applications that makes it easy to store and analyze trillions of events per day up to 1,000 times faster
and at as little as 1/10th the cost of relational databases. Amazon Timestream saves customers time and
kc
cost in managing the lifecycle of time series data by keeping recent data in memory and moving historical
data to a cost optimized storage tier based upon user defined policies. Amazon Timestream's purpose-
built query engine lets customers access and analyze recent and historical data together, without needing
I6
to specify explicitly in the query whether the data resides in the in-memory or cost-optimized tier. Amazon
Timestream has built-in time series analytics functions, helping customers identify trends and patterns in
EK
data in real-time.
Amazon Transcribe
Amazon Transcribe makes it easy for customers to add speech-to-text capability to their applications.
zz
Audio data is virtually impossible for computers to search and analyze. Therefore, recorded speech needs
to be converted to text before it can be used in applications.
n-
Amazon Transcribe uses a deep learning process called automatic speech recognition (ASR) to convert
ke
speech to text quickly. Amazon Transcribe can be used to transcribe customer service calls, to automate
closed captioning and subtitling, and to generate metadata for media assets to create a fully searchable
archive.
-to
Amazon Transcribe automatically adds punctuation and formatting so that the output closely matches the
quality of manual transcription at a fraction of the time and expense.
mr
Gw
AWS Transfer Family
AWS Transfer Family enables the transfer of files directly into and out of Amazon S3. With the support for
A7
Secure File Transfer Protocol (SFTP)—also known as Secure Shell (SSH) File Transfer Protocol, the File
Transfer Protocol over SSL (FTPS) and the File Transfer Protocol (FTP), the AWS Transfer Family helps the
customers seamlessly migrate their file transfer workflows to AWS by integrating with existing
authentication systems and providing DNS routing with Amazon Route 53.
7
g1
Amazon Translate
Amazon Translate is a neural machine translation service that delivers fast, high-quality, and affordable
language translation. Neural machine translation is a form of language translation automation that uses
Rw
deep learning models to deliver more accurate and more natural sounding translation than traditional
statistical and rule- based translation algorithms. Amazon Translate allows customers to localize content
- such as websites and applications - for international users, and to easily translate large volumes of text
efficiently.
ab
AWS User Notifications (Effective August 15, 2023)
AWS User Notifications enables users to centrally configure and view notifications from AWS services,
gv
such as AWS Health events, Amazon CloudWatch alarms, or EC2 Instance state changes, in a consistent,
human-friendly format. Users can view notifications across accounts, regions, and services in a Console
Notifications Center, and configure delivery channels, like email, chat, and push notifications to the AWS
e9
Console mobile app, where they can receive these notifications. Notifications provide URLs to direct users
to resources on the Management Console, to enable further action and remediation.
m
cloud where AWS resources can be launched in a virtual network defined by the customer. Customers can
connect their existing infrastructure to the network isolated Amazon EC2 instances within their Amazon
VPC, including extending their existing management capabilities, such as security services, firewalls and
I6
intrusion detection systems, to include their instances via a Virtual Private Network (VPN) connection. The
VPN service provides end-to-end network isolation by using an IP address range of a customer’s choice,
EK
and routing all of their network traffic between their Amazon VPC and another network designated by the
customer via an encrypted Internet Protocol security (IPsec) VPN.
zz
Customers can optionally connect their VPC to the Internet by adding an Internet Gateway (IGW) or a NAT
Gateway. An IGW allows bi-directional access to and from the internet for some instances in the VPC
based on the routes a customer defines, which specify which IP address traffic should be routable from
n-
the internet, Security Groups, and Network ACLs (NACLS) which limit which instances can accept or send
this traffic. Customers can also optionally configure a NAT Gateway which allows egress-only traffic
ke
initiated from a VPC instance to reach the internet, but not allow traffic initiated from the internet to
reach VPC instances. This is accomplished by mapping the private IP addresses to a public address on the
way out, and then map the public IP address to the private address on the return trip.
-to
The objective of this architecture is to isolate AWS resources and data in one Amazon VPC from another
Amazon VPC, and to help prevent data transferred from outside the Amazon network except where the
m
customer has specifically configured internet connectivity options or via an IPsec VPN connection to their
off-cloud network.
r
Gw
Further details are provided below:
A7
• Virtual Private Cloud (VPC): An Amazon VPC is an isolated portion of the AWS cloud within which
customers can deploy Amazon EC2 instances into subnets that segment the VPC’s IP address
range (as designated by the customer) and isolate Amazon EC2 instances in one subnet from
7
another. Amazon EC2 instances within an Amazon VPC are accessible to customers via Internet
g1
Gateway (IGW), Virtual Gateway (VGW), Transit Gateway (TGW) or VPC Peerings established to
the Amazon VPC (Control AWSCA-3.13 and AWSCA-3.15).
• IPsec VPN: An IPsec VPN connection connects a customer’s Amazon VPC to another network
Rw
designated by the customer. IPsec is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. Amazon VPC
customers can create an IPsec VPN connection to their Amazon VPC by first establishing an
ab
Internet Key Exchange (IKE) security association between their Amazon VPC VPN gateway and
another network gateway using a pre-shared key as the authenticator. Upon establishment, IKE
negotiates an ephemeral key to secure future IKE messages. An IKE security association cannot
gv
be established unless there is complete agreement among the parameters. Next, using the IKE
ephemeral key, two keys in total are established between the VPN gateway and customer
gateway to form an IPsec security association. Traffic between gateways is encrypted and
e9
decrypted using this security association. IKE automatically rotates the ephemeral keys used to
encrypt traffic within the IPsec security association on a regular basis to ensure confidentiality of
communications (Control AWSCA-3.14 and AWSCA-4.3).
m
AWS WAF
kc
AWS WAF is a web application firewall that helps protect customer web applications from common web
exploits that could affect application availability, compromise security, or consume excessive resources.
I6
Customers can use AWS WAF to create custom rules that block common attack patterns, such as SQL
injection or cross-site scripting, and rules that are designed for their specific application. New rules can be
EK
deployed within minutes, letting customers respond quickly to changing traffic patterns. Also, AWS WAF
includes a full-featured API that customers can use to automate the creation, deployment, and
maintenance of web security rules.
zz
to-one and group messaging, voice and video calling, file sharing, screen sharing, and more. AWS Wickr
encrypts messages, calls, and files with a 256-bit end-to-end encryption protocol. Only the intended
recipients and the customer organization can decrypt these communications, reducing the risk of
ke
adversary-in-the-middle attacks.
Amazon WorkDocs
-to
Amazon WorkDocs is a secure content creation, storage and collaboration service. Users can share files,
provide rich feedback, and access their files on WorkDocs from any device. WorkDocs encrypts data in
transit and at rest, and offers powerful management controls, active directory integration, and near real-
m
time visibility into file and user actions. The WorkDocs SDK allows users to use the same AWS tools they
r
Gw
are already familiar with to integrate WorkDocs with AWS products and services, their existing solutions,
third-party applications, or build their own.
A7
Amazon WorkMail
Amazon WorkMail is a managed business email and calendaring service with support for existing desktop
and mobile email clients. It allows access to email, contacts, and calendars using Microsoft Outlook, a
7
browser, or native iOS and Android email applications. Amazon WorkMail can be integrated with a
g1
customer’s existing corporate directory and the customer controls both the keys that encrypt the data
and the location (AWS Region) under which the data is stored.
Rw
Customers can create an organization in Amazon WorkMail, select the Active Directory they wish to
integrate with, and choose their encryption key to apply to all customer content. After setup and
validation of their mail domain, users from the Active Directory are selected or added, enabled for Amazon
WorkMail, and given an email address identity inside the customer owned mail domain.
ab
Amazon WorkSpaces
Amazon WorkSpaces is a managed desktop computing service in the cloud. Amazon WorkSpaces enables
gv
customers to deliver a high-quality desktop experience to end-users as well as help meet compliance and
security policy requirements. When using Amazon WorkSpaces, an organization’s data is neither sent to
nor stored on end-user devices. The PCoIP protocol used by Amazon WorkSpaces uses an interactive video
e9
stream to provide the desktop experience to the user while the data remains in the AWS cloud or in the
organization’s off-cloud environment.
m
When Amazon WorkSpaces is integrated with a corporate Active Directory, each WorkSpace joins the
Active Directory domain, and can be managed like any other desktop in the organization. This means that
kc
customers can use Active Directory Group Policies to manage their Amazon WorkSpaces and can specify
configuration options that control the desktop, including those that restrict users’ abilities to use local
storage on their devices. Amazon WorkSpaces also integrates with customers’ existing RADIUS server to
I6
the service from existing web browsers without infrastructure management, specialized client software,
or virtual private network (VPN) solutions.
n-
AWS X-Ray
AWS X-Ray helps developers analyze and debug production, distributed applications, such as those built
ke
using a microservices architecture. With X-Ray, customers or developers can understand how their
application and its underlying services are performing to identify and troubleshoot the root cause of
performance issues and errors. X-Ray provides an end-to-end view of requests as they travel through the
-to
customers’ application and shows a map of the application’s underlying components. Customers or
developers can use X-Ray to analyze both applications in development and in production.
mr
Gw
VM Import/Export
VM Import/Export is a service that enables customers to import virtual machine images from their existing
A7
environment to Amazon EC2 instances and export them back to their on premises environment. This
offering allows customers to leverage their existing investments in the virtual machines that customers
have built to meet their IT security, configuration management, and compliance requirements by bringing
those virtual machines into Amazon EC2 as ready-to-use instances. Customers can also export imported
7
instances back to their off-cloud virtualization infrastructure, allowing them to deploy workloads across
g1
their IT infrastructure.
Rw
AWS provides many methods for customers to securely handle their data (Control Objective 4: Secure
Data Handling). There are additional methods detailed in the Complementary User Entity Controls at the
end of this section. AWS enables customers to open a secure, encrypted channel to AWS servers using
ab
HTTPS (TLS/SSL).
Amazon S3 provides a mechanism that enables users to utilize MD5 checksums to validate that data sent
gv
to AWS is bitwise identical to what is received, and that data sent by Amazon S3 is identical to what is
received by the user. When customers choose to provide their own keys for encryption and decryption of
Amazon S3 objects (S3 SSE-C), Amazon S3 does not store the encryption key provided by the customer.
e9
Amazon S3 generates and stores a one-way salted HMAC of the customer encryption key and that salted
HMAC value is not logged (Control AWSCA-4.4).
m
Upon initial communication with an AWS-provided Windows AMI, AWS enables secure communication
by configuring Terminal Services on the instance and generating a unique self-signed X.509 server
kc
certificate and delivering the certificate’s thumbprint to the user over a trusted channel (Control AWSCA-
4.2).
I6
AWS further enables secure communication with Linux AMIs, by configuring SSH on the instance,
generating a unique host-key and delivering the key’s fingerprint to the user over a trusted channel
EK
(Control AWSCA-4.1).
Connections between customer applications and Amazon RDS MySQL instances can be encrypted using
zz
TLS/SSL. Amazon RDS generates a TLS/SSL certificate for each database instance, which can be used to
establish an encrypted connection using the default MySQL client. Once an encrypted connection is
established, data transferred between the database instance and a customer’s application will be
n-
encrypted during transfer. If customers require data to be encrypted while “at rest” in the database, the
customer application must manage the encryption and decryption of data. Additionally, customers can
ke
set up controls to have their database instances only accept encrypted connections for specific user
accounts.
-to
Amazon has significant experience in designing, constructing, and operating large-scale data centers. This
m
experience has been applied to the AWS system and infrastructure (Control Objective 5: Physical Security
r
Gw
and Environmental Protection). Refer to the “Amazon Web Services System Overview” section above for
list of in-scope data centers.
A7
Physical Security
AWS provides physical access to its data centers for approved employees and contractors who have a
legitimate business need for such privileges. Access to data centers must be approved by an authorized
7
individual (Control AWSCA-5.1). All visitors are required to present identification and are signed in and
g1
escorted by authorized staff.
When an employee or contractor no longer requires these privileges, his or her access is promptly
Rw
revoked, even if he or she continues to be an employee of Amazon or AWS. In addition, access is
automatically revoked when an employee’s record is terminated in Amazon’s HR system (Control AWSCA-
5.2). Cardholder access to data centers is reviewed quarterly. Cardholders marked for removal have their
access automatically revoked as part of the review (Control AWSCA-5.3).
ab
Physical access is controlled both at the perimeter and at building ingress points by professional security
staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff
gv
utilize multi-factor authentication mechanisms to access data center floors (Control AWSCA-5.4, AWSCA-
5.5, and AWSCA-5.6). e9
In addition to the physical security controls, physical access to data centers in the GovCloud (US) region is
restricted to employees or contractors who have been validated as a U.S. person (green card holder or
citizen as defined by the U.S. Department of State).
m
Amazon owns and operates many of its data centers, while others are housed in colocation spaces that
kc
are offered by various reputable companies under contract with Amazon. The physical access and security
controls described above are also deployed by AWS at colocation spaces.
I6
AWS Local Zones are a type of AWS infrastructure deployment managed and supported by AWS that
places AWS compute, storage, database and other select services closer to large population, industry, IT
EK
centers or customers where no AWS Region currently exists today. With AWS Local Zones, customers can
easily run latency-sensitive portions of applications local to end-users and resources in a specific
geography, delivering single-digit millisecond latency for specific use cases. Dedicated Local Zones are
zz
deployed on-premises, delivered in accordance with a customer specific contract, and dedicated to that
customer, that meets AWS established physical security requirements.
n-
AWS offers Wavelength infrastructure in partnership with Telco providers, which is optimized for mobile
edge computing applications. Wavelength Zones are AWS infrastructure deployments that embed AWS
ke
compute and storage services within communications service providers’ (CSP or telecom providers) data
centers at the edge of the 5G network, so application traffic from 5G devices can reach application servers
running in Wavelength Zones without leaving the telecommunications network. This avoids the latency
-to
that would result from application traffic having to traverse multiple hops across the Internet to reach
their destination, enabling customers to take full advantage of the latency and bandwidth benefits offered
by modern 5G networks.
mr
Gw
Contracts with third-party colocation providers include provisions to support the protection of AWS
assets, communication of incidents or events that impact Amazon assets and/or customers to AWS
A7
(Control AWSCA-5.11). In addition, AWS provides monitoring of adherence with security and operational
standards by performing periodic reviews of colocation service providers (Control AWSCA-5.12). The
frequency of colocation reviews is based on a tiering that is dependent on the contracts and level of
engagement with the colocation service provider.
7
g1
AWS spaces within colocation facilities are installed with AWS-operated closed circuit television (CCTV)
cameras, intrusion detection systems, and access control devices that alert AWS personnel of access and
incidents. Physical access to AWS spaces within colocation facilities is controlled by AWS and follows
Rw
standard AWS access management processes.
Redundancy
Data centers are designed to anticipate and tolerate failure while maintaining service levels. Each AWS
ab
Region is comprised of multiple data centers. All data centers are online and serving traffic; no data center
is “cold.” In case of failure, automated processes move traffic away from the affected area. Core
applications are deployed to an N+1 standard, so that in the event of a data center failure, there is
gv
sufficient capacity to enable traffic to be load-balanced to the remaining sites.
spaces, chiller rooms, and generator equipment rooms. These areas are protected by either wet-pipe,
double-interlocked pre-action, or gaseous sprinkler systems (Control AWSCA-5.7).
kc
Power
The data center electrical power systems supporting AWS are designed to be fully redundant and
I6
maintainable without impact to operations, 24 hours a day, and Uninterruptible Power Supply (UPS) units
provide back-up power in the event of an electrical failure for critical and essential loads in Amazon-owned
EK
data centers and third-party colocation sites where Amazon maintains the UPS units. Amazon-owned data
centers use generators to provide back-up power for the facility (Control AWSCA-5.9 and AWSCA-5.10).
zz
data centers are conditioned to maintain atmospheric conditions at specified levels. Personnel and
systems monitor and control temperature and humidity at appropriate levels. This is provided at N+1 and
ke
also utilizes free cooling as primary source of cooling when and where it is available based on local
environmental conditions (Control AWSCA-5.8).
-to
Environment Management
In Amazon-owned data centers, AWS monitors electrical, mechanical, and life support systems and
equipment so that any issues are immediately identified. This is carried out via daily rounds and readings,
m
in tandem with an overview of our data centers provided via AWS’ Building Management System (BMS)
and Electrical Monitoring System (EMS). Preventative maintenance is performed to maintain the
r
Gw
continued operability of equipment utilizing the Enterprise Asset Management (EAM) tool and trouble
ticketing and change management system. The primary objective of this program is to provide a holistic
A7
insight into Mechanical, Electrical, Plumbing (MEP) Assets owned by AWS infrastructure teams. This
includes providing a centralized repository for equipment, optimizing planned and unplanned
maintenance and managing data center critical spare parts.
7
Management of Media
g1
When a storage device has reached the end of its useful life, AWS procedures include a decommissioning
process that is designed to prevent unauthorized access to assets. AWS uses techniques detailed in NIST
800-88 (“Guidelines for Media Sanitization”) as part of the decommissioning process. All production media
Rw
is securely decommissioned in accordance with industry-standard practices (Control AWSCA-5.13).
Production media is not removed from AWS control until it has been securely decommissioned.
ab
Software
AWS applies a systematic approach to managing changes so that changes to customer impacting services
gv
are reviewed, tested, approved, and well communicated (Control Objective 6: Change Management).
Change management processes are based on Amazon change management guidelines and tailored to the
specifics of each AWS service (Control AWSCA-6.1). These processes are documented and communicated
e9
to the necessary personnel by service team management.
The goal of AWS’ change management process is to prevent unintended service disruptions and maintain
m
the integrity of service to the customer. Change details are documented in one of Amazon’s change
management or deployment tools (Control AWSCA-6.2).
kc
(Control AWSCA-6.4). Customer content is not used in test and development environments.
•
EK
Changes are typically pushed into production in a phased deployment starting with lowest impact sites.
Deployments are closely monitored so impact can be evaluated. Service owners have a number of
ke
configurable metrics that measure the health of the service’s upstream dependencies. These metrics are
closely monitored with thresholds and alarming in place (e.g., latency, availability, fatal errors, CPU
utilization, etc.). Customer information, including personal information, and customer content are not
-to
used in test and development environments (Control AWSCA-6.7). Rollback procedures are documented
so that team members can revert back to the previous state if needed.
mr
Gw
When possible, changes are scheduled during regular change windows. Emergency changes to production
systems that require deviations from standard change management procedures are associated with an
A7
incident and are logged and approved as appropriate.
AWS performs deployment validations and change reviews to detect unauthorized changes to its
environment and tracks identified issues to resolution. AWS management reviews and tracks
7
deployment violations for services enrolled in the Deployment Monitoring program as part of the AWS
g1
Security business review. For those services not enrolled in the Deployment Monitoring program, a
secondary monthly review of deployments is conducted within 60 days of the month in which they were
made. If any unauthorized changes are detected or deviates from the standard review and approval
Rw
process, they are tracked to resolution (Control AWSCA-6.6).
Infrastructure
AWS internally developed configuration management software is installed when new hardware is
ab
provisioned. These tools are run on all UNIX hosts to validate that they are configured and software is
installed in a standard manner based on host classes and updated regularly.
gv
Only approved users with verified business needs are authorized through a permissions service may log
in to the central configuration management servers. Host configuration settings are monitored to validate
compliance with AWS security standards and automatically pushed to the host fleet (Control AWSCA-9.4).
e9
Emergency, non-routine and other configuration changes to existing AWS infrastructure are authorized,
logged, tested, approved and documented in accordance with industry norms for similar systems. Updates
m
to AWS infrastructure are performed in such a manner to minimize impact to the customer and their
service use. AWS communicates with customers, either via email, or through the AWS Health Dashboard
kc
AWS seeks to maintain data integrity through all phases including transmission, storage, and processing.
EK
Amazon S3 utilizes checksums internally to confirm the continued integrity of data in transit within the
system and at rest. Amazon S3 provides a facility for customers to send checksums along with data
transmitted to the service. The service validates the checksum upon receipt of the data to determine that
no corruption occurred in transit. Regardless of whether a checksum is sent with an object to Amazon S3,
zz
the service utilizes checksums internally to confirm the continued integrity of data in transit within the
system and at rest. When disk corruption or device failure is detected, the system automatically attempts
n-
to restore normal levels of object storage redundancy (Control AWSCA-7.1, AWSCA-7.2, and AWSCA-7.3).
ke
AWS services and systems hosting customer content are designed to retain customer content until the
customer removes it or the customer agreement ends (Control AWSCA-7.8). Once the contractual
obligation to retain content ends, or upon a customer-initiated action to remove or delete content, AWS
-to
services have processes and procedures to detect a deletion and make the content inaccessible. AWS
utilizes S3, EC2, EBS, Dynamo DB, KMS, and CloudHSM as the primary services for customer content
storage, which individually or in combination are also utilized by many of the other AWS services listed in
the System Overview for storage of customer content. Glacier, RDS Aurora, SimpleDB, SQS, Cloud
m
Directory, Pinpoint, Secrets Manager, Elastic File System, and CloudFront utilize local storage to store
r
Gw
customer content but are not utilized for content storage functionalities by other services, similar to the
primary AWS content storage Services. When customers request data to be deleted, automated processes
A7
are initiated to remove the data and render the content unreadable (Control AWSCA-7.7).
Data Backup
AWS core storage services have the capability to be redundantly stored in multiple physical locations as
7
part of normal operations. Customers should enable backups of their data across AWS services.
g1
Amazon S3 is designed to provide 99.999999999% durability and 99.99% availability of objects over a
given year. Objects are redundantly stored on multiple devices across multiple facilities in an Amazon S3
Rw
region. To help provide durability, Amazon S3 PUT and COPY operations synchronously store customer
content across multiple facilities before returning SUCCESS. Once stored, Amazon S3 helps maintain the
durability of the objects by detecting and repairing lost redundancy. Amazon S3 also regularly verifies the
integrity of data stored using checksums. If corruption is detected, it is repaired using redundant data. In
ab
addition, Amazon S3 calculates checksums on all network traffic to detect corruption of data packets when
storing or retrieving data (Control AWSCA-7.3, AWSCA-7.4, and AWSCA-7.5).
gv
Amazon EBS replication is stored within the same AZ, not across multiple zones, but customers have the
ability to conduct regular snapshots to Amazon Simple Storage Service (S3) in order to provide long-term
data durability. For customers who have architected complex transactional databases using Amazon EBS,
e9
backups to Amazon S3 can be performed through the database management system so that distributed
transactions and logs can be checkpointed. AWS does not perform backups of data that are maintained
on virtual disks attached to running instances on Amazon EC2.
m
Amazon RDS provides two different methods for backing up and restoring customer DB Instance(s):
kc
automated backups and database snapshots (DB Snapshots). Turned on by default, the automated backup
feature of Amazon RDS enables point-in-time recovery for a DB Instance. Amazon RDS will back up
databases and transaction logs and store both for a user-specified retention period. This allows for
I6
restoration of a DB Instance to any second during the defined retention period, up to the last five minutes.
The automatic backup retention period can be configured to up to 35 days. During the backup window,
EK
storage input/output (I/O) may be suspended for a few seconds, while data is being backed up. This I/O
suspension is avoided with Multi-AZ DB deployments, since the backup is taken from the standby. DB
Snapshots are user-initiated backups of DB Instances. These full database backups will be stored by
zz
Amazon RDS until customers explicitly delete them. Customers can create a new DB Instance from a DB
Snapshot whenever they desire (Control AWSCA-7.6).
n-
E. Monitoring
ke
AWS utilizes a wide variety of automated monitoring systems to provide a high level of service
-to
performance and availability. AWS defines a Security Incident as a security-related adverse event in which
there was a loss of data confidentiality, disruption of data or systems integrity, or disruption or denial of
availability. AWS monitoring tools are implemented to detect unusual or unauthorized activities and
m
conditions at ingress and egress communication points. These tools monitor server and network usage,
r
Gw
port scanning activities, application usage, and unauthorized intrusion attempts. (Control Objective 8:
Incident Handling).
A7
Systems within AWS are further designed to monitor key operational metrics and alarms are configured
to automatically notify operations and management personnel when early warning thresholds are
crossed. An on-call schedule is used such that personnel are always available to respond to operational
7
issues. This includes a pager system, so that notifications are quickly and reliably communicated to
g1
operations personnel (Control AWSCA-8.1).
Documentation is maintained to aid and inform operations personnel in handling incidents or issues. A
Rw
ticketing system is used which supports communication, progress updates, necessary collaboration
between teams, and logging capabilities. Trained call leaders facilitate communication and progress
during the handling of operational issues that require collaboration. After action reviews are convened
following any significant operational issue, regardless of external impact, and Correction of Errors (COE)
ab
documents are composed such that the root cause is captured and preventative actions may be taken for
the future. Implementation of the preventative measures identified in COEs is tracked during weekly
operations meetings.
gv
The AWS Security Operations team employs industry-standard diagnosis procedures (such as incident
identification, registration and verification, initial incident classification and prioritizing actions) to drive
e9
resolution during business-impacting events. Staff operators in the US, EMEA, and APAC provide 24 x 7
continuous coverage to detect incidents and to manage the impact and resolution (Control AWSCA-8.2).
m
AWS monitors resourcing and staffing through an annual assessment of employee qualification alignment
with entity objectives. As part of this process, management and employees formally evaluate, discuss,
kc
and recognize performance over the last year and set goals and priorities for the next year. Management
further reviews operational plans and goals for the coming period to assess alignment of resources and
employee skill sets.
I6
AWS has documented an incident response policy and plan which outlines an organized approach for
responding to security breaches and incidents. The AWS Security team is responsible for monitoring
zz
systems, tracking issues, and documenting findings of security-related events. Records are maintained for
security breaches and incidents, which includes status information, information required for supporting
forensic activities, trend analysis, and evaluation of incident details.
n-
As part of the process, potential breaches of customer content are investigated and escalated to AWS
ke
Security and AWS Legal. Affected customers and regulators are notified of breaches and incidents where
legally required. Customers can subscribe to the AWS Security Bulletins page, which provides information
regarding identified security issues.
-to
mr
Gw
Control Objectives and Related Controls
A7
AWS’ control objectives and related controls are included in Section IV of this report, “Description of
Control Objectives, Controls, Tests, and Results of Tests,” to eliminate the redundancy that would result
from listing them in this section and repeating them in Section IV. Although the control objectives and
related controls are included in Section IV, they are nevertheless an integral part of AWS’ description of
7
controls.
g1
Complementary User Entity Controls
Rw
AWS services were designed with the assumption that certain policies, procedures, and controls are
implemented by its user entities (or customers). In certain situations, the application of specific policies,
procedures, and controls by the customer is necessary to achieve certain control objectives included in
this report. This section describes the additional policies, procedures, and controls customers may need
ab
to implement in order to satisfy the control objectives for customers’ specific use cases.
Security Organization
gv
• Customers should maintain formal policies that provide guidance for information security within
the organization and the supporting IT environment.
e9
• Customers should assess the objectives for their AWS cloud services network when designing IT
components by identifying the risk and corresponding controls to be implemented to address
m
those risks when using AWS services, software and implementing AWS operational controls.
kc
Logical Security
• Customers should use asymmetric key-pairs or multi-factor authentication to access their hosts
I6
• Customers should transmit secret keys over secure channels. Customers should avoid embedding
secret keys in web pages or other publicly accessible source code. Customers should encrypt
n-
their Amazon Virtual Private Cloud to an appropriate point of their internal network.
• S3-Specific – Customers should utilize managed rules and ACLs to secure their S3 buckets by
-to
controlling access to the S3 buckets and preventing them being accessible to the public.
• AppStream 2.0-Specific – Customers are responsible for managing user access to streaming
instances and should maintain controls for approving and granting access, timely removing access
mr
Gw
when an employee leaves the organization or changes job responsibilities, and periodically
reviewing appropriate access levels for existing users.
A7
Secure Data Handling
7
• Customers should use encrypted (TLS/SSL) connections for all of their interactions with AWS.
Leading practices include the use of TLS 1.2. Customers should opt in for annual key rotation for
g1
any KMS key they would like rotated.
• Customers should utilize multi-factor authentication for controlling access to their root account
Rw
credentials and should avoid using root account credentials beyond initial account configuration
of AWS Identity and Access Management (IAM), except for Services for which IAM is not available.
Customers should delete access key(s) for the root account when not in use.
•
ab
Customers should appropriately configure and manage usage and implementation of available
encryption options to meet their requirements.
• Outpost-Specific – Customers should restrict and monitor physical access to data centers and
gv
facilities hosting Outpost devices to personnel based on job responsibilities.
• Outpost-Specific – Customers are responsible for verifying their site meets the Outpost
e9
requirements for facility, networking, and power as published on
https://docs.aws.amazon.com/outposts/latest/userguide/outposts-requirements.html.
• Outpost-Specific – Customers are responsible for removal of the Nitro Security Key (NSK) to
m
ensure customer content is crypto shredded from the Outpost before returning it to AWS.
kc
Change Management
• Customers are responsible for maintaining the application of patches to customer’s Amazon
I6
instances. Customers can leverage automated patching tools such as AWS Systems Manager
Patch Manager to help deploy operating systems and software patches automatically across large
EK
groups of instances.
• Customers should set up separate development and production accounts to isolate the
production system from development work.
zz
• App Mesh-Specific - Customers utilizing their own Envoy image should follow a documented
change management process to ensure updated configurations are documented, tested and
n-
• Customers should utilize Amazon S3’s option to specify an MD5 checksum as part of a REST PUT
-to
operation for the data being sent to Amazon S3. When the request arrives at Amazon S3, an MD5
checksum will be recalculated for the object data received and compared to the provided MD5
checksum. If there is a mismatch, the PUT will be failed, preventing data that was corrupted on
m
the wire from being written into Amazon S3. Customers should use the MD5 checksums returned
r
Gw
in response to REST GET requests to confirm that the data returned by the GET was not corrupted
in transit.
A7
• Any code customers write to call Amazon APIs should expect to receive and handle errors from
the service. Specific guidance for each service can be found within the User Guide and API
documentation for each service.
7
• EBS-Specific – Amazon EBS replication is stored within the same AZ, not across multiple zones,
g1
and therefore customers should conduct regular snapshots to Amazon S3 in order to provide long-
term data durability.
• EC2/VPC-Specific – Data stored on Amazon EC2 virtual disks should be proactively copied to
Rw
another storage option for redundancy.
• Customers should ensure their AWS resources such as server and database instances have the
appropriate levels of redundancy and isolation. Redundancy can be achieved through utilization
ab
of the Multi-Region and Multi-AZ deployment option where available.
• Customers should enable backups of their data across AWS services.
gv
• Customer should enable and configure service-specific logging features where available for all
services and implement appropriate monitoring and incident response processes.
•
e9
Customers should ensure appropriate logging for events such as administrator activity, system
errors, authentication checks, data deletions etc. is in place to support monitoring and incident
response processes.
m
• Snowball Edge/Snowmobile-Specific – All data is encrypted before persisting. With Snowball Edge
and Snowmobile, there are short periods where customer content is in plain text prior to
I6
encryption and persistence. If a customer is concerned about this short period, they should
encrypt their data before sending it to the device.
EK
• EC2-Specific – Customers are responsible for configuring the Time Sync functionality and
monitoring the synchronization for accuracy across their EC2 instances, as published by AWS in
user guide documentation - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/set-
zz
time.html#configure-amazon-time-service-amazon-linux.
Incident Handling
n-
• Customers may subscribe to Premium Support offerings that include direct communication with
ke
the customer support team and proactive alerting to any issues that may impact the customer.
The list of control considerations presented above does not represent all the controls that should be
-to
employed by the customer. Other controls may be required. Customers should reference additional AWS
service documentation on the AWS website.
mr
AWS Confidential
89
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Testing Performed and Results of Entity-Level Controls
A7
In planning the nature, timing and extent of testing of the controls, EY considered the aspects of AWS’
control environment and tested those controls that were considered necessary.
In addition to the tests of operating effectiveness of specific controls described below, procedures
7
included tests of the following components of the internal control environment of AWS:
g1
• Management controls and organizational structure
• Risk assessment process
Rw
• Information and communication
• Control activities
ab
• Monitoring
Tests of the control environment included the following procedures, to the extent EY considered
gv
necessary: (a) a review of AWS’ organizational structure, including the segregation of functional
responsibilities, policy statements, processing manuals and personnel controls, (b) discussions with
management, operations, administrative and other personnel who are responsible for developing,
e9
ensuring adherence to and applying controls, and (c) observations of personnel in the performance of
their assigned duties.
m
The control environment was considered in determining the nature, timing and extent of the testing of
controls and controls relevant to the achievement of the control objectives.
kc
Procedures for Assessing Completeness and Accuracy of Information Provided by the Entity (IPE)
I6
For tests of controls requiring the use of IPE (e.g., controls requiring system-generated populations for
sample-based testing), EY performed a combination of the following procedures where possible based on
EK
the nature of the IPE to address the completeness, accuracy, and data integrity of the data or reports
used: (1) inspect the source of the IPE, (2) inspect the query, script, or parameters used to generate the
IPE, (3) tie data between the IPE and the source, and/or (4) inspect the IPE for anomalous gaps in sequence
zz
or timing to determine the data is complete, accurate, and maintains its integrity. In addition to the above
procedures, for tests of controls requiring management’s use of IPE in the execution of the controls (e.g.,
periodic reviews of user access listings), EY inspected management’s procedures to assess the validity of
n-
the IPE source and the completeness, accuracy, and integrity of the data or reports.
ke
On the pages that follow, the description of control objectives and the controls to achieve the objectives
-to
have been specified by, and are the responsibility of, AWS. The “Tests Performed by EY” and the “Results
of Tests” are the responsibility of the service auditor.
m
Note: A comparison of AWS controls that have been revised during the examination period is provided in
Section V of this report, “Other Information Provided By Amazon Web Services” for informational
purposes.
r
te
AWS Confidential
90
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Information System Control Environment
A7
The following controls apply to the services listed in the System Description and their supporting data
centers, except where controls are unique to one of the services – in those cases, the controls are
indicated as “S3-Specific,” “EC2-Specific,” “VPC-Specific,” “KMS-Specific,” “RDS-Specific,” “Outposts-
Specific,” or otherwise noted as being specific to a certain service or set of services.
7
g1
Control Objective 1: Security Organization
Controls provide reasonable assurance that information security policies have been implemented and
Rw
communicated throughout the organization.
ab
AWSCA-1.1: The AWS Inquired of an AWS Security Assurance No deviations noted.
organization has defined Program Manager to ascertain the AWS
structures, reporting lines with organization has defined structures,
gv
assigned authority and reporting lines with assigned authority,
responsibilities to appropriately and responsibilities to appropriately meet
meet requirements relevant to business requirements, including an
e9
security, availability, information security function.
confidentiality, and privacy.
Inspected the organizational chart and No deviations noted.
m
AWS Confidential
91
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 1: Security Organization
A7
Controls provide reasonable assurance that information security policies have been implemented and
communicated throughout the organization.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-1.2: AWS maintains Inquired of an AWS Security Assurance No deviations noted.
formal policies that provide Program Manager to ascertain formal
guidance for information security policies exist, including
Rw
security within the organization designation of responsibility and
and the supporting IT accountability for managing the system
environment. and controls, and providing guidance for
information security within the
ab
organization and the supporting IT
environment.
gv
Inspected the information security policies No deviations noted.
listed in the System Description to
ascertain they included organization-wide
e9
security procedures as guidance for the
AWS environment and the supporting IT
environment.
m
AWSCA-1.3: Security policies are Inquired of an AWS Security Assurance No deviations noted.
kc
AWS Confidential
92
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 1: Security Organization
A7
Controls provide reasonable assurance that information security policies have been implemented and
communicated throughout the organization.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
days of role assignment and that the
training course included information
security requirements as defined in the
Rw
AWS Security Awareness Training Policy.
AWSCA-1.5: AWS maintains a Inquired of an AWS Senior Risk Manager No deviations noted.
formal risk management to ascertain a formal risk management
ab
program to identify, analyze, program was maintained to continually
treat and continuously monitor discover, research, plan, resolve, monitor,
and report risks that affect AWS’ and optimize information security risks,
gv
business objectives and including an evaluation of the design and
regulatory requirements. The operating effectiveness of implemented
program identifies risks, controls.
e9
documents them in a risk
register as appropriate, and Inspected the risk management No deviations noted.
reports results to leadership at documentation to ascertain the AWS
m
transfer.
AWS Confidential
93
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 1: Security Organization
A7
Controls provide reasonable assurance that information security policies have been implemented and
communicated throughout the organization.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
key material, inspected the roles and
responsibilities documents to ascertain
user responsibilities were formally
Rw
documented and that the individuals
signed the document.
AWSCA-1.9: AWS prepares and Inquired of the Financial Planning and No deviations noted.
ab
consolidates the operational Analysis Senior Manager to ascertain AWS
planning document annually. prepared and consolidated the
The operational plan includes operational planning document annually
gv
operational and performance including operational and performance
objectives, regulatory and objectives as well as regulatory and
compliance requirements with compliance requirements with sufficient
e9
sufficient clarity to enable the clarity to enable the identification and
identification and assessment of assessment of risks relating to objectives.
risks relating to objectives.
m
to those objectives.
AWSCA-1.10: AWS has a process Inquired of the Risk and Resiliency Senior No deviations noted.
in place to review Manager to ascertain environmental and
zz
AWS Confidential
94
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 2: Employee User Access
A7
Controls provide reasonable assurance that procedures have been established so that Amazon
employee user accounts are added, modified and deleted in a timely manner and reviewed on a
periodic basis.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-2.1: User access to the Inquired of a Corporate Systems Manager
No deviations noted.
internal Amazon network is not to ascertain user access to the internal
provisioned unless an active Amazon network was not activated unless
Rw
record is created in the HR an active record was created in the HR
System by Human Resources. System by Human Resources, that access
Access is automatically was automatically provisioned with least
provisioned with least privilege privilege per job function, and that first-
ab
per job function. First time time passwords were set to a unique value
passwords are set to a unique and changed immediately after first use.
gv
value and changed immediately
after first use. Inspected the system configurations
No deviations noted.
responsible for provisioning access to the
internal Amazon network to ascertain
e9
access to Windows and UNIX user
accounts could not be provisioned unless
m
an active record was created in the HR
System by Human Resources, that access
was provisioned automatically with least
kc
AWS Confidential
95
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 2: Employee User Access
A7
Controls provide reasonable assurance that procedures have been established so that Amazon
employee user accounts are added, modified and deleted in a timely manner and reviewed on a
periodic basis.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-2.2: IT access above Inquired of Software Development
No deviations noted.
least privileged, including Managers to ascertain IT access above
administrator accounts, is least privileged, including administrator
Rw
approved by appropriate accounts, was approved by appropriate
personnel prior to access personnel prior to access provisioning.
provisioning.
ab
Inspected the system configurations
No deviations noted.
responsible for the access provisioning
gv
process to ascertain IT access above least
privileged, including administrator
accounts, was required to be approved by
e9
appropriate personnel prior to automatic
access provisioning.
m
For one active employee, inspected the
No deviations noted.
process of access provisioning to ascertain
approval of the access was provided by
kc
appropriate personnel.
AWS Confidential
96
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 2: Employee User Access
A7
Controls provide reasonable assurance that procedures have been established so that Amazon
employee user accounts are added, modified and deleted in a timely manner and reviewed on a
periodic basis.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Inspected the system configurations
No deviations noted.
responsible for the access review process
to ascertain IT infrastructure and network
Rw
access privileges were reviewed on a
quarterly basis by appropriate personnel
or access was automatically removed.
ab
Inspected the system configurations
No deviations noted.
responsible for the temporary access
revocation process to ascertain when the
gv
temporary privileges to resources expired,
access to the resources was automatically
removed.
e9
Inspected the system configurations
No deviations noted.
responsible for the internal transfer
m
AWS Confidential
97
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 2: Employee User Access
A7
Controls provide reasonable assurance that procedures have been established so that Amazon
employee user accounts are added, modified and deleted in a timely manner and reviewed on a
periodic basis.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Selected a user with temporary access to
No deviations noted.
the IT infrastructure and network access
privileges to ascertain that when the
Rw
temporary privileges to the resource
expired, access was automatically
revoked.
ab
Selected an active access group of IT
No deviations noted.
infrastructure and network access
privileges that was not reviewed during
gv
the quarter and inspected the access log
to ascertain access privileges were
automatically revoked.
e9
Selected an active access group and
No deviations noted.
inspected the access review process to
m
by appropriate personnel.
No deviations noted.
system generated listing of active internal
AWS accounts and inspected the access
EK
AWS Confidential
98
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 2: Employee User Access
A7
Controls provide reasonable assurance that procedures have been established so that Amazon
employee user accounts are added, modified and deleted in a timely manner and reviewed on a
periodic basis.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
(deactivated) in the HR System Inspected the system configurations
No deviations noted.
by Human Resources. responsible for terminating access to
Amazon systems, to ascertain access to
Rw
Windows and UNIX user accounts were
configured to be automatically revoked
within 24 hours after an employee’s
ab
record was terminated (deactivated) in
the HR System by Human Resources.
gv
No deviations noted.
and one involuntarily terminated
employee selected from an HR system
generated listing of terminated
e9
employees, inspected each employee's HR
system record, to ascertain access to the
m
Amazon systems was automatically
revoked within 24 hours on both
Unix/LDAP and Windows/AD accounts.
kc
I6
EK
zz
n-
ke
-to
mr
te
AWS Confidential
99
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-2.5: Password settings are Inquired of a Corporate Systems Manager
No deviations noted.
managed in compliance with and Corporate Response Manager to
Amazon.com’s Password Policy. ascertain password complexity, length,
Rw
maximum age, history, lockout and
credential monitoring was enforced per
the Amazon.com Password Policy.
ab
Inspected the password configurations to
No deviations noted.
ascertain they were configured to enforce
the Amazon.com Password Policy,
gv
including:
AWS Confidential
100
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Observed that the following password
No deviations noted.
configurations were enforced according to
the Amazon.com Password Policy after
Rw
attempting to set a combination of out-of-
policy passwords using the password tool
within the production environment:
ab
• Passwords must be at least eight
characters long
gv
• Passwords must contain a combination
of letters, numbers, and special characters
e9
• Passwords must not contain the user’s
real name or username
m
Password Policy.
No deviations noted.
impacted user credentials to ascertain
credentials of flagged Amazon accounts
ke
AWS Confidential
101
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-2.6: AWS requires two- Inquired of a Corporate Systems Manager
No deviations noted.
factor authentication over an to ascertain two-factor authentication
approved cryptographic channel over an approved cryptographic channel
Rw
for authentication to the internal was required to access the Amazon
AWS network from remote corporate network from remote locations.
locations.
ab
Inspected the authentication protocol
No deviations noted.
configuration to ascertain authentication
gv
to the internal AWS network from remote
locations required two-factor
authentication over an approved
e9
cryptographic channel.
authorized.
mr
te
AWS Confidential
102
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-3.2: Firewall policies Inquired of an AWS Infrastructure Security
No deviations noted.
(configuration files) are Engineer to ascertain firewall policies
automatically pushed to were automatically pushed to production
Rw
production firewall devices. firewall devices.
ab
firewalls, inspected the deployment log
output to ascertain policies were
automatically pushed to production
gv
firewall devices.
No deviations noted.
selected from a system generated list of
in-scope firewalls with firewall policy
updates applied, inspected approval
I6
prior to implementation.
are investigated and tracked to performed and that identified issues were
resolution in a timely manner. investigated and tracked to resolution.
mr
te
AWS Confidential
103
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Inspected the listing of production end
No deviations noted.
points used by the vulnerability
assessment tools of the quarterly external
Rw
vulnerability assessments performed to
ascertain production hosts for the in-
scope services (that supported public end
ab
points) were included in the quarterly
scans.
gv
No deviations noted.
evidence of external vulnerability
assessments to ascertain the assessments
were performed, results were
e9
documented, and that the process existed
for any identified issues to be tracked,
m
addressed, and resolved in a timely
manner.
kc
service) that they own. AWS customers were prevented from accessing
prevents customers from accessing AWS resources that were not assigned to
AWS resources that are not them via access permissions, and that
zz
AWS Confidential
104
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Inspected the configurations in-place for
No deviations noted.
the AWS services that managed external
access to AWS services and resources (if
Rw
resource-level permissions were
applicable to the service), to ascertain
services were designed to return content
ab
only to individuals authorized to access
the specified AWS service or resource, and
that AWS prevented customers from
gv
accessing resources that had not been
assigned to them via access permissions.
evaluate whether security risks are launch to evaluate whether security risks
identified and mitigated. were identified and mitigated.
-to
mr
te
AWS Confidential
105
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For a sample of products, services, and
No deviations noted.
significant feature additions selected from
a system generated list of trouble tickets
Rw
representing launches during the period,
inspected the Application Security team’s
review to ascertain the products, services,
ab
and significant feature additions were
reviewed prior to launch.
gv
No deviations noted.
devices are configured by AWS to Manager to ascertain network devices
only allow access to specific ports were configured to only allow access to
on other server systems within specific ports on server systems within
e9
Amazon S3. Amazon S3.
No deviations noted.
selected from a listing of S3 network
devices generated from the S3 code
kc
specified ports.
EK
accessor IP address, object and address, object, and operation, and that
operation. Logs are retained for at logs were retained for at least 90 days.
least 90 days.
n-
AWS Confidential
106
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For a sample of AWS Availability Zones
No deviations noted.
(AZs) selected from a listing of AZs
generated from the AZ code repository,
Rw
inspected the environment operational
configurations for log retention of external
access to data to ascertain that logs were
ab
configured to be retained for 90 days.
gv
an S3 object and inspected the external
data access log output after 90 days to
ascertain the following information was
e9
logged for at least 90 days: data accessor
IP accessing the data, object accessed, and
m
operation performed.
No deviations noted.
hosts have host-based firewalls to ascertain EC2 physical hosts had host-
prevent unauthorized access. based firewalls, or access was logically
restricted, to prevent unauthorized access.
I6
No deviations noted.
responsible for configuring a new host to
ascertain that host-based firewalls were
automatically added during the build
zz
No deviations noted.
an API request with and without the
appropriate token to ascertain a host-
based access token was required to
m
AWS Confidential
107
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For a sample of EC2 physical hosts
No deviations noted.
supporting in-scope AWS regions selected
from listings of production hosts for each
Rw
region, inspected the host-based firewall
settings to ascertain host-based firewalls
were in place and operational to prevent
ab
unauthorized access.
gv
which are configured to prevent software firewalls, which prevented
TCP/IP spoofing, packet sniffing, TCP/IP spoofing, packet sniffing, and
and restrict incoming connections restricted incoming connections to
e9
to customer-specified ports. customer-specified ports.
No deviations noted.
a virtual EC2 host with a firewall
configured to communicate with only
kc
No deviations noted.
attempt to communicate with an
unspecified IP address to ascertain the
attempts were denied.
zz
AWS Confidential
108
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-3.11: EC2-Specific – AWS Inquired of an EC2 Security Manager to
No deviations noted.
prevents customers from accessing ascertain AWS prevented customers from
custom AMIs not assigned to them accessing custom AMIs not assigned to
Rw
by a property of the AMI called them by default launch-permissions.
launch-permissions. By default, the
launch-permissions of an AMI Inspected the AMI launch-permissions
No deviations noted.
configuration within the AWS console to
ab
restrict its use to the
customer/account that created and ascertain that by default the launch
registered it. permission of an AMI restricted its use to
the account that created it unless the
gv
customer granted access permissions.
No deviations noted.
attempt to access a file stored on an EC2
instance from the physical EC2 host the
instance was located on, to ascertain the
-to
AWS Confidential
109
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Observed an EC2 Security Engineer
No deviations noted.
attempt to access a file stored on an EC2
instance from a different instance on the
Rw
same physical EC2 host, to ascertain the
instances on the same physical hosts were
isolated from one another.
ab
AWSCA-3.13: VPC-Specific – Inquired of an EC2 Networking Software
No deviations noted.
Network communications within a Development Engineer to ascertain
VPC are isolated from network network communications between
gv
communications within other VPCs. different VPCs were isolated from one
another.
e9
Observed an EC2 Networking Software
No deviations noted.
Development Engineer configure the VPC
infrastructure for two VPCs and attempt
m
No deviations noted.
Development Engineer configure a VPC
infrastructure with two VPN Gateways and
n-
AWS Confidential
110
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-3.15: VPC-Specific – Inquired of an EC2 Security Engineer to
No deviations noted.
Internet traffic through an Internet ascertain internet traffic through an
Gateway is forwarded to an Internet Gateway was only forwarded to
Rw
instance in a VPC only when an an instance in a VPC when an Internet
Internet Gateway is attached to the Gateway was attached to the VPC and a
VPC and a public IP is mapped to public IP was mapped to the instance in
ab
the instance in the VPC. the VPC.
gv
inspection of traffic on an instance,
ascertained traffic was successfully
forwarded.
e9
Removed the Internet Gateway and public
No deviations noted.
IP from the VPC and per inspection of the
m
provide guidance for operations policies and procedures for the use of
and information security within the mobile devices existed and included
EK
access content for which for the use of mobile devices were
Amazon is responsible. available to AWS employees.
ke
-to
mr
te
AWS Confidential
111
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
• Remote wipe capability. Inspected the mobile device policy to
No deviations noted.
ascertain it included organization-wide
• Password-guessing
security procedures as guidance for the
Rw
protection restrictions.
AWS environment regarding:
• Remote synchronization • Use of mobile devices
requirements. • Protection of devices that access content
ab
• Security patch requirements for which Amazon is responsible
• Remote wipe capability
• Approved methods for • Password-guessing protection
accessing Amazon data
gv
restrictions
• Remote synchronization requirements
• Security patch requirements
e9
• Approved methods for accessing
Amazon data
m
Inquired of an AWS Senior Security
AWSCA-3.17: Outpost-Specific – No deviations noted.
Engineer to ascertain Service link was
Service link is established between
established between Outposts and an
kc
Direct Connect.
Connect.
Inspected the Outposts configurations to
EK
No deviations noted.
ascertain Service link was established
between Outpost and an AWS Region by
use of a secured VPN connection over
zz
AWS Confidential
112
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-3.18: Anti-virus software is Inquired of an AWS Senior Security
No deviations noted.
installed, updated and running on Engineer to ascertain anti-virus software
workstations. was installed, updated, and running on
Rw
workstations.
ab
of workstations to ascertain the anti-virus
software was in place to monitor for
malicious code, was automatically
gv
updated with new release or virus
definitions and prevented end-users from
disabling the service.
e9
Inspected a workstation that had disabled
No deviations noted.
anti-virus software to ascertain that the
m
No deviations noted.
to ascertain production hosts were
configured to monitor compliance with
AWS security standards and to
-to
AWS Confidential
113
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 3: Logical Security
A7
Controls provide reasonable assurance that policies and mechanisms are in place to appropriately restrict
unauthorized internal and external access to data and customer data is appropriately segregated from
other customers.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
Selected production hosts and inspected
No deviations noted.
the automated deployment logs to
ascertain production hosts automatically
Rw
requested and installed host configuration
setting updates pushed to the fleet.
ab
No deviations noted.
deployment attempt for each host
deployment mechanism, inspected the
ticket details to ascertain the unsuccessful
gv
installation of host configuration settings
was identified, tracked and resolved in a
timely manner.
e9
m
kc
I6
EK
zz
n-
ke
-to
mr
te
AWS Confidential
114
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
AWSCA-4.1: EC2-Specific – Upon Inquired of an EC2 Security Engineer to
g1
No deviations noted.
initial communication with an ascertain upon initial communication with
AWS-provided Linux AMI, AWS an AWS-provided Linux AMI, AWS enabled
enables secure communication a secure communication by SSH
Rw
by SSH configuration on the configuration on the instance by
instance, by generating a unique generating and delivering a unique host-
host-key and delivering the key fingerprint to the user over a trusted
ab
key’s fingerprint to the user channel.
over a trusted channel.
Launched a public Linux AMI EC2 instance
No deviations noted.
and inspected the EC2 console to ascertain
gv
the unique host-key fingerprint was
accessible from the system log.
e9
Using the launched public Linux AMI EC2
No deviations noted.
instance, connected to the instance via
SSH using the unique host-key fingerprint
m
was listed.
No deviations noted.
instance and inspected the EC2 console
and instance connection logs to ascertain
EK
No deviations noted.
instance, attempted to connect to the
instance via SSH using the first instance's
n-
fingerprint.
mr
te
AWS Confidential
115
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
AWSCA-4.2: EC2-Specific – Upon Inquired of an EC2 Security Engineer to
g1
No deviations noted.
initial communication with an ascertain upon initial communication with
AWS-provided Windows AMI, an AWS-provided Windows AMI, AWS
AWS enables secure enabled a secure communication by
Rw
communication by configuring configuring Windows Terminal Services on
Windows Terminal Services on the instance by generating a unique self-
the instance by generating a signed server certificate and delivering the
ab
unique self-signed server certificate’s thumbprint to the user over a
certificate and delivering the trusted channel.
certificate’s thumbprint to the
Launched a public Windows AMI EC2
gv
user over a trusted channel. No deviations noted.
instance and inspected the EC2 console
and the system log to ascertain the self-
signed server certificate was accessible.
e9
Using the launched public Windows AMI
No deviations noted.
EC2 instance, connected to the instance
m
No deviations noted.
EC2 instance and inspected the EC2
console and instance connection logs to
ascertain the unique self-signed server
zz
AWS Confidential
116
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
AWSCA-4.3: VPC-Specific – Inquired of a VPC Manager of Software
g1
No deviations noted.
Amazon enables secure VPN Development to ascertain Amazon
communication to a VPN enabled secure VPN communication to a
Gateway by providing a shared VPN Gateway through a secret key that
Rw
secret key that is used to established IPSec Associations.
establish IPSec Associations.
Observed a VPC Manager of Software
No deviations noted.
Development use the shared secret key to
ab
establish IPSec Associations to ascertain
the connection was successful.
gv
Observed the VPC Manager of Software
No deviations noted.
Development alter the shared secret key
to establish IPSec Security Associations to
e9
ascertain the connection was
unsuccessful.
m
AWS Confidential
117
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
Observed an S3 Software Development
g1
No deviations noted.
Engineer attempt to decrypt an object in
S3 with an incorrect encryption key to
ascertain the decrypt function failed and
Rw
the object was unreadable.
ab
operations in KMS are logically no AWS employee could gain logical
secured so that no AWS access to the hardened security modules
employee can gain access to the where customer keys were used for
gv
key material. cryptographic operations.
material.
No deviations noted.
Development Engineer attempt to gain
logical access to the hardened security
EK
AWS Confidential
118
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
AWSCA-4.6: KMS-Specific – Inquired of Software Development
g1
No deviations noted.
AWS Services that integrate Engineers to ascertain AWS Services which
with AWS KMS for key integrate with AWS KMS for key
management use a 256-bit data management used a 256-bit AES data key
Rw
key locally to protect customer locally to protect customer content.
content.
Inspected the API call configurations of the
No deviations noted.
services which integrate with KMS for
ab
services that store customer content to
ascertain each service was configured to
send 256-bit AES key requests to KMS.
gv
AWSCA-4.7: KMS-Specific – The Inquired of an AWS Cryptography
No deviations noted.
key provided by KMS to Technical Program Manager to ascertain
e9
integrated services is a 256-bit keys provided by KMS to integrated
key and is encrypted with a 256- services were 256-bit AES keys and were
bit AES key unique to the themselves encrypted by 256-bit AES keys
m
cryptographic algorithm.
EK
AWS Confidential
119
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
Observed an AWS Cryptography Software
g1
No deviations noted.
Development Engineer create a resource
with content enabled for encryption using
KMS and then attempt to access the data
Rw
without decrypting to ascertain it was
unreadable.
ab
No deviations noted.
Development Engineer create a resource
with content enabled for encryption using
KMS and then attempt to decrypt the data
gv
using the required 256-bit AES data key to
ascertain the data was successfully
decrypted.
e9
Uploaded test data using a KMS-
No deviations noted.
integrated service encrypted with a data
m
No deviations noted.
Requests in KMS are logged in Technical Program Manager to ascertain
AWS CloudTrail. API calls made by the AWS services that
n-
AWS Confidential
120
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
Enabled CloudTrail logging on a service
g1
No deviations noted.
that integrates with KMS, uploaded data
using a KMS key for encryption, and
downloaded the same file for decryption
Rw
and inspected the logs in AWS CloudTrail
to ascertain activity from both encryption
and decryption API calls was logged.
ab
AWSCA-4.9: KMS-Specific – KMS Inquired of an AWS Cryptography
No deviations noted.
endpoints can only be accessed Technical Program Manager to ascertain
by customers using TLS with KMS endpoints could only be accessed
gv
cipher suites that support using TLS with cipher suites to support
forward secrecy. forward secrecy.
e9
Inspected the configuration for KMS TLS
No deviations noted.
communication to ascertain the cipher
suites listed supported forward secrecy.
m
No deviations noted.
Development Engineer attempt to connect
to a public KMS service endpoint using an
unsupported cipher suite to ascertain the
I6
used for a single purpose as keys used in AWS KMS were only used for
defined by the key usage a single purpose as defined by the key
parameter for each key. usage parameter for each key.
-to
mr
te
AWS Confidential
121
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
Inspected the source code responsible for
g1
No deviations noted.
AWS KMS key usage, to ascertain the key
usage parameter was configured at the
key level and that key operations required
Rw
the use of keys designated by the system
for that operation.
ab
No deviations noted.
to perform a key operation in alignment
with the key usage parameter to ascertain
the operation was performed in
gv
accordance with the set parameter.
AWS Confidential
122
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
Inspected a key rotation event log for an
g1
No deviations noted.
AWS internal key to ascertain the backing
key was rotated in accordance with the
defined frequency.
Rw
AWSCA-4.12: KMS-Specific – Inquired of an AWS Cryptography
No deviations noted.
Recovery key materials used for Technical Program Manager to ascertain
disaster recovery processes by recovery key materials used for disaster
ab
KMS are physically secured recovery processes by KMS were
offline so that no single AWS physically secured offline so that no single
employee can gain access to the AWS employee could gain access to the
gv
key material. key material.
documentation. documentation.
No deviations noted.
or requests to recovery key materials to
ascertain reviews were performed and
documented by authorized operators on a
-to
AWS Confidential
123
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
AWSCA-4.14: KMS-Specific – Inquired of an AWS Cryptography
g1
No deviations noted.
Each production firmware Technical Program Manager to ascertain
version for the AWS Key the production firmware version of the
Management Service HSM AWS Key Management Service HSM was
Rw
(Hardware Security Module) has certified with NIST under the FIPS 140-2
been certified with NIST under level 3 standard or is in the process of
the FIPS 140-2 level 3 standard being certified under the FIPS 140-3 level
ab
or is in the process of being 3 standard.
certified under FIPS 140-3 level
3. For all in scope regions, inspected the
No deviations noted.
firmware version running on production
gv
AWS Key Management Service HSM
devices to ascertain the production
firmware version of the AWS Key
e9
Management Service HSMs was certified
by NIST Cryptographic Module Validation
m
Program Certificate under the FIPS 140-2
level 3 standard or updated firmware was
in the process of being certified under the
kc
No deviations noted.
Specific – Production HSM Program Manager to ascertain Production
devices are received in tamper HSM devices were received in tamper
EK
AWS Confidential
124
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 4: Secure Data Handling
A7
Controls provide reasonable assurance that data handling between the customer’s point of initiation
to an AWS storage location is secured and mapped accurately.
7
For one HSM device that failed validation,
g1
No deviations noted.
inspected the validations log to ascertain
that the HSM device was automatically
prohibited from entering production when
Rw
the HSM serial number could not be
verified against data provided out-of-band
by the manufacturer.
ab
For one production HSM device, inspected
No deviations noted.
the validations log to ascertain the HSM
device’s serial number was verified against
gv
data provided out-of-band before it
entered into production.
e9
m
kc
I6
EK
zz
n-
ke
-to
mr
te
AWS Confidential
125
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-5.1: Physical access to Inquired of an AWS Security Technical
No deviations noted.
data centers is approved by an Program Manager to ascertain physical
authorized individual. access to data centers was approved by an
Rw
authorized individual.
ab
provisioning within the data center access
management system to ascertain physical
access to data centers was designed to be
gv
granted after an approval by an
authorized individual.
e9
For one user provisioned data center
No deviations noted.
access during the period, inspected the
data center physical access provisioning
m
authorized individual.
No deviations noted.
revoked within 24 hours of the Program Manager to ascertain physical
employee or vendor record access was automatically revoked within
EK
No deviations noted.
within the data center access
management system to ascertain physical
n-
system.
-to
mr
te
AWS Confidential
126
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For one terminated employee, inspected
No deviations noted.
the HR System record to ascertain physical
access was systematically revoked within
Rw
24 hours of the employee record being
deactivated in the HR system by the
access provisioning system.
ab
AWSCA-5.3: Physical access to Inquired of an AWS Security Technical
No deviations noted.
data centers is reviewed on a Program Manager to ascertain physical
quarterly basis by appropriate access to data centers was reviewed on a
gv
personnel. quarterly basis by appropriate personnel.
AWS Confidential
127
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-5.4: Closed circuit Inquired of an AWS Security Technical
No deviations noted.
television cameras (CCTV) are Program Manager and Data Center
used to monitor server locations Operations Managers to ascertain physical
Rw
in data centers. Images are access points to server locations were
retained for 90 days, unless monitored by a closed circuit television
limited by legal or contractual camera (CCTV) and that images were
ab
obligations. retained for 90 days unless limited by legal
or contractual obligations.
gv
No deviations noted.
the asset management tool, observed the
CCTV footage or inspected screenshots of
CCTV footage of areas around access
e9
points to server locations, to ascertain
physical access points to server locations
m
were recorded.
No deviations noted.
the asset management tool, inspected the
network video recorder configuration to
ascertain CCTV images to server locations
I6
devices.
ke
-to
mr
te
AWS Confidential
128
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For a sample of data centers selected from
No deviations noted.
the asset management tool, observed
electronic access control devices at
Rw
physical access points to server locations
or inspected the physical security access
control configurations to ascertain
ab
electronic access control devices were
installed at physical access points to server
locations and that they required
gv
authorized Amazon badges with
corresponding PINs to enter server
locations.
e9
AWSCA-5.6: Electronic intrusion Inquired of an AWS Security Technical
No deviations noted.
detection systems are installed Program Manager and Data Center
m
within data server locations to Operations Managers to ascertain
monitor, detect, and electronic intrusion detection systems
automatically alert appropriate were installed and capable of detecting
kc
No deviations noted.
the asset management tool, observed on-
premise electronic intrusion detection
EK
AWS Confidential
129
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For a sample of Amazon-owned data
No deviations noted.
centers selected from the asset
management tool, observed on-premise
Rw
fire detection systems to ascertain they
were located throughout the data centers.
ab
No deviations noted.
centers, observed on-premise fire
suppression devices to ascertain they
were located throughout the data centers.
gv
AWSCA-5.8: Amazon-owned Inquired of Data Center Operations
No deviations noted.
data centers are air conditioned Managers to ascertain Amazon-owned
e9
to maintain appropriate data centers were air conditioned to
atmospheric conditions. maintain appropriate atmospheric
Personnel and systems monitor conditions and that the units were
m
appropriate levels.
No deviations noted.
centers selected from the asset
management tool, observed on-premise
EK
AWS Confidential
130
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
where Amazon maintains the Inspected the system configuration
No deviations noted.
UPS units. responsible for the automatic onboarding
and continuous monitoring of the health
Rw
of Amazon maintained UPS units to
ascertain that UPS units were being
monitored and would send an alert in the
ab
event of an electrical failure.
gv
would send an alert in the event of an
electrical failure.
e9
For a sample of data centers selected from
No deviations noted.
the asset management tool, observed on-
premise UPS equipment to ascertain UPS
m
failure.
AWS Confidential
131
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-5.11: Contracts are in Inquired of AWS Legal Corporate Counsel
No deviations noted.
place with third-party colocation to ascertain contracts were in place at the
service providers which include colocation service providers which
Rw
provisions to provide fire included provisions for fire suppression
suppression systems, air systems, air conditioning, UPS units, and
conditioning to maintain redundant power supplies as well as
ab
appropriate atmospheric provisions requiring communication of
conditions, Uninterruptible incidents or events that impacted Amazon
Power Supply (UPS) units assets or customers to AWS.
gv
(unless maintained by Amazon),
and redundant power supplies. For a sample of data centers managed by
Contracts also include provisions No deviations noted.
colocation service providers selected from
requiring communication of
e9
the asset management tool, inspected the
incidents or events that impact current contractual agreements between
Amazon assets and/or service providers and AWS to ascertain
m
customers to AWS. they included provisions for fire
suppression systems, air conditioning, UPS
kc
No deviations noted.
periodic reviews of colocation Manager to ascertain periodic reviews
service providers to validate were performed for colocation vendor
n-
AWS Confidential
132
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 5: Physical Security and Environmental Protection
A7
Controls provide reasonable assurance that physical access to data centers is restricted to authorized
personnel and that mechanisms are in place to minimize the effect of a malfunction or physical
disaster to data center facilities.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
For a sample of data centers managed by
No deviations noted.
colocation service providers selected from
the asset management tool, inspected the
Rw
corresponding vendor reviews to ascertain
they were performed in accordance with
the colocation business review schedule
ab
and included an evaluation of adherence
to AWS security and operational
standards.
gv
AWSCA-5.13: All AWS Inquired of Data Center Operations
No deviations noted.
production media is securely Managers to ascertain AWS production
decommissioned and physically media was securely decommissioned and
e9
destroyed, verified by two physically destroyed prior to leaving AWS
personnel, prior to leaving AWS Secure Zones.
m
Secure Zones.
Inspected the AWS Media Destruction
No deviations noted.
Standard Operating Procedures document
kc
AWS Confidential
133
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 6: Change Management
A7
Controls provide reasonable assurance that changes (including emergency/non-routine and
configuration) to existing IT resources are logged, authorized, tested, approved and documented.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-6.1: AWS applies a Inquired of Software Development
No deviations noted.
systematic approach to Managers to ascertain customer-
managing change to ensure impacting changes of service to the
Rw
changes to customer-impacting production environment were reviewed,
aspects of a service are tested, approved, and followed relevant
reviewed, tested and approved. change management guidelines and that
ab
Change management standards service-specific change management
are based on Amazon guidelines processes were maintained, followed, and
and tailored to the specifics of communicated to the service teams.
gv
each AWS service.
For a sample of services, inspected the
No deviations noted.
relevant change management guidelines
documents to ascertain they
e9
communicated specific guidance on
change management processes, including
m
initiation, testing and approval, and that
service team-specific steps were
documented and maintained by the
kc
teams.
No deviations noted.
documented within one of Managers to ascertain changes were
Amazon’s change management documented within one of Amazon's
EK
to production.
r
te
AWS Confidential
134
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 6: Change Management
A7
Controls provide reasonable assurance that changes (including emergency/non-routine and
configuration) to existing IT resources are logged, authorized, tested, approved and documented.
7
For a sample of changes selected from a
g1
No deviations noted.
system-generated listing of changes
migrated to production, inspected the
relevant documentation to ascertain
Rw
changes were tested according to service
team change management standards and
testing occurred in a development
ab
environment prior to migration to
production.
gv
No deviations noted.
ascertain that policies managed by AWS
were tested prior to being moved to
production.
e9
AWSCA-6.4: AWS maintains Inquired of Software Development
No deviations noted.
separate production and Managers to ascertain AWS maintained
m
No deviations noted.
reviewed for business impact Managers to ascertain changes were
and approved by authorized reviewed for business impact and
n-
standards. standards.
-to
mr
te
AWS Confidential
135
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 6: Change Management
A7
Controls provide reasonable assurance that changes (including emergency/non-routine and
configuration) to existing IT resources are logged, authorized, tested, approved and documented.
7
For a sample of changes selected from a
g1
No deviations noted.
system-generated listing of changes
migrated to production, inspected the
relevant documentation to ascertain
Rw
changes were reviewed and approved by
authorized personnel prior to migration to
production according to service team
ab
change management standards.
gv
ascertain that policies were designed to
require approvals prior to being moved to
production.
e9
Inspected an AWS managed IAM policy to
No deviations noted.
ascertain that policies managed by AWS
m
AWS Confidential
136
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 6: Change Management
A7
Controls provide reasonable assurance that changes (including emergency/non-routine and
configuration) to existing IT resources are logged, authorized, tested, approved and documented.
7
For a sample of quarters, inspected the
g1
No deviations noted.
quarterly security business reviews and
the contents of the deployment violations
dashboard to ascertain unauthorized
Rw
changes were tracked to resolution by
AWS management.
ab
For a sample of months and services using
No deviations noted.
manual deployment monitoring, inspected
review documentation to ascertain that
gv
the related AWS service team generated a
listing of all changes deployed to
production during the month, assessed
e9
the changes for appropriateness, and
follow-up actions were taken as necessary
to remediate any issues identified.
m
content are not used in test and employee data, were not used in test or
development environments. development environments.
n-
AWS Confidential
137
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
Controls Specified by AWS Tests Performed by EY Results of Tests
g1
AWSCA-7.1: S3-Specific – S3 Inquired of an S3 Software Development
No deviations noted.
compares user provided Manager to ascertain S3 compared user
checksums to validate the provided checksums to validate the
Rw
integrity of data in transit. If the integrity of data in transit, and that the
customer provided MD5 customer provided MD5 checksum must
checksum does not match the match the MD5 checksum calculated by S3
MD5 checksum calculated by S3 on the data received; otherwise the REST
ab
on the data received, the REST PUT request would fail, preventing
PUT will fail, preventing data corrupted data from being written into S3.
that was corrupted on the wire
gv
from being written into S3. Inspected the MD5 checksum
No deviations noted.
configurations to ascertain S3 was
configured to continually compare the
e9
user provided checksums to validate the
integrity of data in transit.
m
corruption.
mr
te
AWS Confidential
138
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
Observed an S3 Software Development
g1
No deviations noted.
Engineer locate an object whose
checksum was not validated against its
object locator, to ascertain the object was
Rw
automatically detected by the S3 service
to prevent object corruption.
ab
No deviations noted.
rest to ascertain checksums were utilized
to assess the continuous integrity checks
of data.
gv
Inspected the S3 logs to ascertain S3 was
No deviations noted.
designed to automatically attempt to
e9
restore normal levels of object storage
redundancy when disk corruption or
device failure was detected.
m
No deviations noted.
disk corruption or device failure Manager to ascertain when disk
is detected, the system corruption or device failure was detected,
automatically attempts to the system automatically attempted to
I6
AWS Confidential
139
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
AWSCA-7.4: S3-Specific – Inquired of an S3 Software Development
g1
No deviations noted.
Objects are stored redundantly Manager to ascertain objects were stored
across multiple fault-isolated redundantly across multiple fault-isolated
facilities. facilities.
Rw
Uploaded an object and observed a
No deviations noted.
Software Development Engineer access
the object location configuration to
ab
ascertain the object was stored
redundantly across multiple fault-isolated
facilities.
gv
AWSCA-7.5: S3-Specific – The Inquired of an S3 Software Development
No deviations noted.
design of systems is sufficiently Manager to ascertain systems were
e9
redundant to sustain the loss of designed to sustain the loss of a data
a data center facility without center facility without interruption to the
interruption to the service. service.
m
No deviations noted.
utilized by S3 on stored objects to
ascertain critical services were designed to
sustain the loss of a facility without
I6
AWS Confidential
140
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
Created an RDS database, enabled
g1
No deviations noted.
backups and backed up the database to
ascertain RDS backed up customer
databases via scheduled backups
Rw
according to a user-defined retention
period.
ab
No deviations noted.
point in time database snapshot and
restored the RDS database using the
captured snapshot, to ascertain RDS
gv
databases were capable of a point-in-time
recovery using database snapshots.
e9
Restored an RDS database using a
No deviations noted.
database backup, to ascertain RDS
databases are capable of a point-in-time
m
recovery.
kc
AWS Confidential
141
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
For the services that provide content
g1
No deviations noted.
storage as described in the System
Description, inspected the configurations
designed to automatically delete content
Rw
from buckets, volumes, instances, or other
means of content storage, to ascertain it
was designed to delete and render the
ab
data unreadable.
gv
storage as described in the System
Description, independently created an
AWS cloud account registered to an
e9
independent email address and created
sample content into buckets, volumes,
instances, or other means of content
m
an active state.
EK
AWS Confidential
142
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
For the services that provide content
g1
No deviations noted.
storage as described in the System
Description, deleted the content and/or
the underlying buckets, volumes,
Rw
instances, or other means of content
storage, and inspected if the data
identifiers were removed or the data itself
ab
was zeroed out after being deleted to
ascertain it was rendered unreadable.
gv
No deviations noted.
content storage as described in the
System Description, observed Software
Development Managers query for the
e9
objects metadata for the deleted objects
to ascertain that an error was returned
m
stating the object could not be found.
No deviations noted.
customer content per customer Technical Program Manager to ascertain
agreements. AWS retained customer content per the
customer agreements.
I6
No deviations noted.
AWS Customer Agreement to ascertain it
was communicated externally to
customers and contained an effective
zz
AWS Confidential
143
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
Inspected the customer account content
g1
No deviations noted.
retention configuration to ascertain a
centralized account service was designed
to send notifications to services to delete
Rw
customer content 90 days after account
closure.
ab
No deviations noted.
content integrated with the centralized
account service, created a unit of content
storage, closed the AWS account and
gv
inspected the content throughout the 90-
day lifecycle to ascertain customer
content was retained until deleted 90 days
e9
after customer account closure.
No deviations noted.
content for more than 30 days, created a
unit of content storage, closed the AWS
kc
retained.
EK
content.
Inspected the Outposts configurations to
No deviations noted.
ascertain the Outpost was configured to
ke
AWS Confidential
144
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
Inspected the Standard Operating
g1
No deviations noted.
Procedures for Outpost Retrieval
document to ascertain the Nitro Security
Key was mechanically destroyed at the
Rw
time of retrieval.
ab
successfully encrypted the content on the
Outpost with a valid Nitro Security Key.
gv
Inspected logs of an Outpost without a
No deviations noted.
valid Nitro Security Key to ascertain that it
was not able to unencrypt the content on
e9
the Outpost without the valid Nitro
Security Key.
m
clock synchronization.
n-
AWS Confidential
145
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 7: Data Integrity, Availability and Redundancy
A7
Controls provide reasonable assurance that data integrity is maintained through all phases including
transmission, storage and processing.
7
For a sample of AWS Availability Zones
g1
No deviations noted.
(AZs) selected from a listing of AZs
generated from the AZ code repository,
inspected the AWS managed Grandmaster
Rw
clock devices to ascertain that the
Grandmaster devices were active and that
monitoring was enabled to ensure that an
ab
accuracy within 1 millisecond of
Coordinated Universal Time was achieved.
gv
e9
m
kc
I6
EK
zz
n-
ke
-to
mr
te
AWS Confidential
146
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 8: Incident Handling
A7
Controls provide reasonable assurance that system incidents are recorded, analyzed and resolved.
7
AWSCA-8.1: Monitoring and Inquired of Software Development
g1
No deviations noted.
alarming are configured by Managers to ascertain the production
Service Owners to identify and environment was monitored and that
notify operational and alarming was configured by Service
Rw
management personnel of Owners to notify operational and
incidents when early warning management personnel when early
thresholds are crossed on key warning thresholds were crossed on key
ab
operational metrics. operational metrics.
gv
inspected their configurations to ascertain
related monitoring and alarming were in
place to notify appropriate personnel
e9
when a threshold was reached or
exceeded.
m
No deviations noted.
configurations that automatically create
tickets for Network Monitoring incidents
to ascertain incidents were logged within a
zz
AWS Confidential
147
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 9: Security
A7
Controls provide reasonable assurance that Management’s oversight of the control environment,
which includes security and data protection of the system is established and maintained.
7
AWSCA-1.7: The Board and its Inquired of the Vice President of General
g1
No deviations noted.
Committees have the required Counsel to ascertain the board and its
number of independent Board committees had the required number of
members and each Board and independent Board members and each
Rw
Committee member is qualified Board and Committee member was
to serve in such capacity. qualified to serve in such capacity.
Annually, Board members
Inspected Amazon’s Company Bylaws and
ab
complete questionnaires to No deviations noted.
establish whether they are the Company’s Corporate Governance
independent and qualified to guidelines to ascertain they defined the
number and roles of officers on the Board
gv
serve on each Board Committee
under applicable rules. of Directors and their responsibilities.
AWS Confidential
148
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 9: Security
A7
Controls provide reasonable assurance that Management’s oversight of the control environment,
which includes security and data protection of the system is established and maintained.
7
management team. As part of Inspected the Nominating and Corporate
g1
No deviations noted.
the annual Company and CEO Governance meeting minutes to ascertain
Performance review, the Board the annual assessment and review of the
reviews the succession plan for composition of the Board of Directors was
Rw
the CEO. discussed and completed.
ab
reviewed the succession plan for the CEO
and senior management team as part of
the annual Company and CEO
gv
performance review.
AWS Confidential
149
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 9: Security
A7
Controls provide reasonable assurance that Management’s oversight of the control environment,
which includes security and data protection of the system is established and maintained.
7
AWSCA-9.3: AWS performs Inquired of the Director of Talent
g1
No deviations noted.
annual formal evaluation of Management to ascertain a process was in
resourcing and staffing including place to perform a formal evaluation of
assessment of employee resourcing and staffing annually, including
Rw
qualification alignment with an assessment of employee qualification
entity objectives. Employees alignment with entity objectives and that
receive feedback on their employees received feedback on their
ab
strengths and growth ideas strengths and growth ideas.
annually.
For a sample of AWS employees selected
No deviations noted.
from an HR system-generated listing,
gv
inspected performance evaluation records
to ascertain each employee was formally
evaluated against entity objectives during
e9
the most recent annual formal evaluation
of resourcing and staffing.
m
No deviations noted.
public websites to ascertain they provided
information including a system description
-to
AWS Confidential
150
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 9: Security
A7
Controls provide reasonable assurance that Management’s oversight of the control environment,
which includes security and data protection of the system is established and maintained.
7
Inspected a ticket resulting from a
g1
No deviations noted.
customer inquiry, to ascertain a process is
in place to address, track and resolve
customer inquiries in a timely manner.
Rw
AWSCA-9.6: The Company Inquired of a Vice President of Litigation
No deviations noted.
provides a hotline for Legal to ascertain the company provided a
employees to anonymously hotline for employees to anonymously
ab
report on possible violations of report on possible violations of conduct.
conduct.
gv
Inspected the Owner’s Manual and Guide
No deviations noted.
to Employment policy to ascertain
employees were provided access to the
e9
ethics hotline in all geographies during
orientation.
m
Business Conduct and Ethics and Company’s Code of Business Conduct and
similar policies are appropriately Ethics and similar policies were
handled in terms of appropriately handled in terms of
communication and possible communications and possible disciplinary
zz
AWS Confidential
151
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 9: Security
A7
Controls provide reasonable assurance that Management’s oversight of the control environment,
which includes security and data protection of the system is established and maintained.
7
Inspected the Code of Business Conduct
g1
No deviations noted.
and Ethics policy to ascertain that
employee expectations were published on
the intranet for employees to review and
Rw
consequences for certain violations were
documented within the policy.
ab
No deviations noted.
investigation process wiki and Enterprise
Case Management system to ascertain
they detailed standard operating
gv
procedures for the handling of a potential
material violation of the Company’s Code
of Business Conduct Ethics for both
e9
employee’s and vendors, including the
handling of communication and possible
m
disciplinary action.
No deviations noted.
established a formal audit Director to ascertain AWS had established
program that includes continual, a formal audit program that included
independent internal and continual, independent internal and
I6
AWS Confidential
152
Section IV – Description of Control Objectives, Controls,
Tests, and Results of Tests
Gw
Control Objective 9: Security
A7
Controls provide reasonable assurance that Management’s oversight of the control environment,
which includes security and data protection of the system is established and maintained.
7
AWSCA-9.9: AWS has a process Inquired of a Security Assurance Program
g1
No deviations noted.
to assess whether AWS Manager to ascertain employees with
employees who have access to access to resources that store or process
resources that store or process customer data via permission groups
Rw
customer data via permission received a background check, as
groups are subject to a post-hire applicable with local law, no less than
background check as applicable once per calendar year.
ab
with local law. AWS employees
who have access to resources For a sample of AWS employees selected
No deviations noted.
that store or process customer from a system generated listing of
accounts that have access to resources
gv
data will have a background
check in accordance to the AWS that store or process customer data,
Personnel Security Policy. inspected their background check status
to ascertain background checks were
e9
completed once per calendar year or
access to resources that stored or
m
processed customer data was removed as
appropriate.
kc
I6
EK
zz
n-
ke
-to
mr
te
AWS Confidential
153
Gw
7 A7
g1
Rw
ab
gv
e9
SECTION V – Other Information Provided By Amazon Web Services
m
kc
I6
EK
zz
n-
ke
-to
mr
te
Gw
Business Continuity Management
A7
Amazon’s infrastructure provides customers the features to deploy a resilient IT architecture. AWS has
designed its systems to adapt system or hardware failures with minimal customer impact. The Data Center
Resiliency Program at AWS is under the direction of the Amazon Infrastructure Group.
7
AWS Availability Model:
g1
The AWS availability model offers redundancy and resiliency and is different to a traditional model
involving backup tapes, offsite data storage, and alternate processing facilities. The AWS network is built
Rw
to provide highly available computing and data storage and architected for redundancy to minimize the
impact of outages.
AWS resiliency encompasses the processes and procedures to identify, respond to, and recover from a
ab
major event or incident within our environment. The AWS program builds upon a traditional approach to
contingency management, which incorporates elements of business continuity and disaster recovery
plans, and expands this to consider critical elements of proactive risk mitigation strategies such as
gv
engineering physically separate Availability Zones (AZs) within an AWS Region and conducting continuous
infrastructure capacity planning.
e9
Each AWS Region is a geographic area made up of multiple physically separated locations known as AZs.
Each AZ contains at least one data center. Within the United States, each Region has at least 3 AZs, with
m
more in certain Regions based on the volume of customer traffic to the Region. The presence of multiple
AZs allows us to maintain redundant power, mechanical, networking, and connectivity across each Region.
kc
AWS strives for redundancy that allows for concurrent maintainability. In this model, we maintain enough
redundant capacity that we can perform maintenance on a critical system or component within a data
I6
center (such as a generator or Uninterrupted Power Supply) without impacting service availability.
AZs within a Region are connected with low latency, high throughput, and highly redundant networking.
EK
AZs are also sited at calculated geographic distances from one another. Placing the AZs in relative
proximity to one another drives low latency data replication, while physical separation drives continuous
service availability in the event of major geographic incidents (for example, floods or earthquakes).
zz
AWS Services are configured to run independently across AZs. If a single event impacts the connectivity
or accessibility of one AZ, service operation within other AZs remains unaffected. The architecture of AWS
n-
data centers across AZs redirects traffic away from the affected area, providing an additional layer of
protection against failures such as power outages.
ke
AWS services are designed to utilize available storage and compute capacity as new resources are added
to AWS. The AWS recovery model is aligned with normal daily operations to continually add new capacity
-to
to address demand.
AWS Local Zones are a type of AWS infrastructure deployment managed and supported by AWS that
m
places AWS compute, storage, database and other select services closer to large population, industry, IT
centers or customers where no AWS Region currently exists today. With AWS Local Zones, customers can
r
te
Gw
easily run latency-sensitive portions of applications local to end-users and resources in a specific
geography, delivering single-digit millisecond latency for use cases. Dedicated Local Zones are deployed
A7
on-premises, delivered in accordance with a customer specific contract, and dedicated to that customer,
that meets AWS established physical security requirements.
7
AWS offers Wavelength infrastructure in partnership with Telco providers, which is optimized for mobile
edge computing applications. Wavelength Zones are AWS infrastructure deployments that embed AWS
g1
compute and storage services within communications service providers’ (CSP or telecom providers) data
centers at the edge of the 5G network, so application traffic from 5G devices can reach application servers
running in Wavelength Zones without leaving the telecommunications network. This avoids the latency
Rw
that would result from application traffic having to traverse multiple hops across the Internet to reach
their destination, enabling customers to take full advantage of the latency and bandwidth benefits offered
by modern 5G networks.
ab
SOC Controls Adjustment Overview
gv
The section below provides an overview of the key changes to SOC controls that occurred during the
Summer 2024 (07/01/2023 - 06/30/2024) reporting period from previous reports.
e9
Section I: Modifications to existing controls
m
Service HSM (Hardware Security Module) has Service HSM (Hardware Security Module) has
been validated with NIST under the FIPS 140-2 been certified with NIST under the FIPS 140-2
EK
standard or is in the process of being validated. level 3 standard or is in the process of being
certified under FIPS 140-3 level 3.
Rationale: In an effort of continuous improvement, AWS updates the report to reflect its most current
zz
process documentation. The previous control language has been updated to additionally address the
submission of HSMs for validation under FIPS 140-3. No significant change to the control design and
n-
operation.
ke
-to
mr
te
Gw
Appendix – Glossary of Terms
A7
AMI: An Amazon Machine Image (AMI) is an encrypted machine image stored in Amazon S3. It contains
all the information necessary to boot instances of a customer’s software.
API: Application Programming Interface (API) is an interface in computer science that defines the ways by
7
which an application program may request services from libraries and/or operating systems.
g1
Authentication: Authentication is the process of determining whether someone or something is, in fact,
who or what it is declared to be.
Availability Zone: Amazon EC2 locations are composed of regions and Availability Zones. Availability
Rw
Zones are distinct locations that are engineered to be insulated from failures in other Availability Zones
and provide inexpensive, low latency network connectivity to other Availability Zones in the same region.
Bucket: A container for objects stored in Amazon S3. Every object is contained within a bucket. More
ab
information can be found in https://docs.aws.amazon.com/AmazonS3/latest/dev/Introduction.html
#BasicsBucket
Customer Content: Defined as “Your Content” in https://aws.amazon.com/agreement/
gv
HMAC: In cryptography, a keyed-Hash Message Authentication Code (HMAC or KHMAC), is a type of
message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash
e9
function in combination with a secret key. As with any MAC, it may be used to simultaneously verify both
the data integrity and the authenticity of a message. Any iterative cryptographic hash function, such as
MD5 or SHA-1, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-
m
MD5 or HMAC-SHA1, accordingly. The cryptographic strength of the HMAC depends upon the
cryptographic strength of the underlying hash function, on the size and quality of the key and the size of
kc
IP Address: An Internet Protocol (IP) address is a numerical label that is assigned to devices participating
EK
in a computer network utilizing the Internet Protocol for communication between its nodes.
IP Spoofing: Creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing,
with the purpose of concealing the identity of the sender or impersonating another computing system.
zz
MD5 checksums: In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash
function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide
n-
variety of security applications and is also commonly used to check the integrity of files.
Object: The fundamental entities stored in Amazon S3. Objects consist of object data and metadata. The
ke
data portion is opaque to Amazon S3. The metadata is a set of name-value pairs that describe the object.
These include some default metadata such as the date last modified and standard HTTP metadata such
as Content-Type. The developer can also specify custom metadata at the time the Object is stored.
-to
Port Scanning: A port scan is a series of messages sent by someone attempting to break into a computer
to learn which computer network services, each associated with a “well-known” port number, the
computer provides.
m
User entity: The entities that use the services of a service organization during some or all of the review
period.
r
te
Gw
Service: Software or computing ability provided across a network (e.g., Amazon EC2, Amazon S3).
Service Organization: An organization or segment of an organization that provides services to user entities
A7
that are likely to be relevant to those user entities’ internal control over financial reporting.
Signature Version 4: Signature Version 4 is the process to add authentication information to AWS
7
requests. For security, most requests to AWS must be signed with an access key, which consists of an
access key ID and secret access key.
g1
Subservice Organization: A service organization used by another service organization to perform some of
the services provided to user entities that are likely to be relevant to those user entities’ internal control
Rw
over financial reporting.
Virtual Instance: Once an AMI has been launched, the resulting running system is referred to as a virtual
instance. All instances based on the same AMI start out identical and any information on them is lost when
the instances are terminated or fail.
ab
X.509: In cryptography, X.509 is an ITU-T standard for a Public Key Infrastructure (PKI) for Single Sign-On
(SSO) and Privilege Management Infrastructure (PMI). X.509 specifies, among other things, standard
gv
formats for public key certificates, certificate revocation lists, attribute certificates and a certification path
validation algorithm. e9
m
kc
I6
EK
zz
n-
ke
-to
mr
te