AWS Security
AWS Security
In the Shared Security Responsibility Model, AWS is responsible for securing the underlying
infrastructure that supports the cloud, and you’re responsible for anything you put on the
cloud or connect to the cloud.
• AWS is responsible for protecting the global infrastructure that runs all of the services
offered in the AWS cloud. This infrastructure is comprised of the hardware, software,
networking, and facilities that run AWS services.
• AWS provide several reports from third-party auditors who have verified their compliance
with a variety of computer security standards and regulations
• AWS is responsible for the security configuration of its products that are considered
managed services for e.g. RDS, DynamoDB
• For Managed Services, AWS will handle basic security tasks like guest operating system
(OS) and database patching, firewall configuration, and disaster recovery.
Customer Security Responsibilities
• AWS Infrastructure as a Service (IaaS) products for e.g. EC2, VPC, S3 are completely under
your control and require you to perform all of the necessary security configuration and
management tasks.
• Management of the guest OS (including updates and security patches), any application
software or utilities installed on the instances, and the configuration of the AWS-provided
firewall (called a security group) on each instance
• For most of these managed services, all you have to do is configure logical access controls
for the resources and protect the account credentials
IT infrastructure that AWS provides to its customers is designed and managed in alignment
with security best practices and a variety of IT security standards, including:
• SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70)
• SOC 2
• SOC 3
• FISMA, DIACAP, and FedRAMP
• DOD CSM Levels 1-5
• PCI DSS Level 1
• ISO 9001 / ISO 27001
• ITAR
• FIPS 140-2
• MTCS Level 3
Storage Decommissioning
• When a storage device has reached the end of its useful life, AWS procedures include a
decommissioning process that is designed to prevent customer data from being exposed to
unauthorized individuals.
• AWS uses the techniques detailed in DoD 5220.22-M (National Industrial Security Program
Operating Manual) or NIST 800-88 (Guidelines for Media Sanitization) to destroy data as
part of the decommissioning process.
• All decommissioned magnetic storage devices are degaussed and physically destroyed in
accordance with industry-standard practices.
Network Security
AWS utilizes a wide variety of automated monitoring systems to provide a high level of service
performance and availability. These tools monitor server and network usage, port scanning
activities, application usage, and unauthorized intrusion attempts. The tools have the ability to
set custom performance metrics thresholds for unusual activity.
• Secure software development best practices, which include formal design reviews by the
AWS Security Team, threat modeling, and completion of a risk assessment
• Static code analysis tools are run as a part of the standard build process
• Recurring penetration testing performed by carefully selected industry experts
AWS account security features includes credentials for access control, HTTPS endpoints for
encrypted data transmission, the creation of separate IAM user accounts, user activity logging
for security monitoring, and Trusted Advisor security checks
AWS Credentials
Individual User Accounts
Do not use the Root account, instead create an IAM User for each user and provide them with
a unique set of Credentials and grant least privilege as required to perform their job function
Use HTTPS, provided by all AWS services, for data transmissions, which uses public-key
cryptography to prevent eavesdropping, tampering, and forgery
Security Logs
Use Amazon CloudTrail which provides logs of all requests for AWS resources within
the account and captures information about every API call to every AWS resource you use,
including sign-in events