Skip to the content.

Security & Compliance

AWS Shared Responsibility Model

Shared Responsibility Categories

Aspect AWS Responsibility Customer Responsibility
Infrastructure Physical security, hardware, and global network. Not applicable (fully managed by AWS).
Configuration Default configurations for services. Customize configurations to meet security requirements.
Data Protection Ensure data encryption capabilities are available. Encrypt sensitive data and manage access permissions.
Patching Patching underlying infrastructure. Patching the operating system and applications.
Access Management IAM service availability and best practices. Defining and enforcing user and resource permissions.

Example for RDS

Example for S3

DDOS Protection on AWS

AWS Shield

AWS WAF - Web Application Firewall

Penetration Testing on AWS Cloud

Data at rest vs. Data in transit

AWS KMS (Key Management Service)

AWS CloudHSM

Types of Customer Master Keys: CMK

Customer Managed CMK

AWS managed CMK

AWS owned CMK

CloudHSM Keys (custom keystore)

AWS Certificate Manager (ACM)

AWS Secrets Manager

AWS Artifact

AWS GuardDuty

AWS Inspector

What does AWS Inspector evaluate?

AWS Config

Amazon Macie

AWS Security Hub

Amazon Detective

AWS Abuse

Root user privileges

IAM Access Analyzer

Summary