docs.aws.amazon.com Open in urlscan Pro
13.35.58.82  Public Scan

URL: https://docs.aws.amazon.com/whitepapers/latest/introduction-aws-security/security-of-the-aws-infrastructure.html
Submission: On March 20 via api from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

SELECT YOUR COOKIE PREFERENCES

We use essential cookies and similar tools that are necessary to provide our
site and services. We use performance cookies to collect anonymous statistics so
we can understand how customers use our site and make improvements. Essential
cookies cannot be deactivated, but you can click “Customize cookies” to decline
performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide
useful site features, remember your preferences, and display relevant content,
including relevant advertising. To continue without accepting these cookies,
click “Continue without accepting.” To make more detailed choices or learn more,
click “Customize cookies.”

Accept all cookiesContinue without acceptingCustomize cookies


CUSTOMIZE COOKIE PREFERENCES

We use cookies and similar tools (collectively, "cookies") for the following
purposes.


ESSENTIAL

Essential cookies are necessary to provide our site and services and cannot be
deactivated. They are usually set in response to your actions on the site, such
as setting your privacy preferences, signing in, or filling in forms.




PERFORMANCE

Performance cookies provide anonymous statistics about how customers navigate
our site so we can improve site experience and performance. Approved third
parties may perform analytics on our behalf, but they cannot use the data for
their own purposes.

Allow performance category
Allowed


FUNCTIONAL

Functional cookies help us provide useful site features, remember your
preferences, and display relevant content. Approved third parties may set these
cookies to provide certain site features. If you do not allow these cookies,
then some or all of these services may not function properly.

Allow functional category
Allowed


ADVERTISING

Advertising cookies may be set through our site by us or our advertising
partners and help us deliver relevant marketing content. If you do not allow
these cookies, you will experience less relevant advertising.

Allow advertising category
Allowed

Blocking some types of cookies may impact your experience of our sites. You may
review and change your choices at any time by clicking Cookie preferences in the
footer of this site. We and selected third-parties use cookies or similar
technologies as specified in the AWS Cookie Notice.

CancelSave preferences




UNABLE TO SAVE COOKIE PREFERENCES

We will only store essential cookies at this time, because we were unable to
save your cookie preferences.

If you want to change your cookie preferences, try again later using the link in
the AWS console footer, or contact support if the problem persists.

Dismiss


Contact Us
English


Create an AWS Account
 1. AWS
 2. ...
    
    
 3. Documentation
 4. AWS Whitepapers
 5. AWS Whitepaper

Feedback
Preferences


INTRODUCTION TO AWS SECURITY


AWS WHITEPAPER

 * Abstract
 * Security of the AWS Infrastructure
 * Security Products and Features
    * Infrastructure Security
    * Inventory and Configuration Management
    * Data Encryption
    * Identity and Access Control
    * Monitoring and Logging
    * Security Products in AWS Marketplace

 * Security Guidance
 * Compliance
 * Further Reading
 * Document Revisions
 * Notices

Security of the AWS Infrastructure - Introduction to AWS Security
AWSDocumentationAWS WhitepapersAWS Whitepaper


SECURITY OF THE AWS INFRASTRUCTURE

PDFRSS

The AWS infrastructure has been architected to be one of the most flexible and
secure cloud computing environments available today. It is designed to provide
an extremely scalable, highly reliable platform that enables customers to deploy
applications and data quickly and securely.

This infrastructure is built and managed not only according to security best
practices and standards, but also with the unique needs of the cloud in mind.
AWS uses redundant and layered controls, continuous validation and testing, and
a substantial amount of automation to ensure that the underlying infrastructure
is monitored and protected 24x7. AWS ensures that these controls are replicated
in every new data center or service.

All AWS customers benefit from a data center and network architecture built to
satisfy the requirements of our most security-sensitive customers. This means
that you get a resilient infrastructure, designed for high security, without the
capital outlay and operational overhead of a traditional data center.

AWS operates under a shared security responsibility model, where AWS is
responsible for the security of the underlying cloud infrastructure and you are
responsible for securing workloads you deploy in AWS (Figure 1). This gives you
the flexibility and agility you need to implement the most applicable security
controls for your business functions in the AWS environment. You can tightly
restrict access to environments that process sensitive data, or deploy less
stringent controls for information you want to make public.



Figure 1: AWS Shared Security Responsibility Model

Javascript is disabled or is unavailable in your browser.

To use the Amazon Web Services Documentation, Javascript must be enabled. Please
refer to your browser's Help pages for instructions.

Document Conventions
Abstract
Security Products and Features
Did this page help you? - Yes

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of
it.



Did this page help you? - No

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.





DID THIS PAGE HELP YOU?

Yes
No
Provide feedback

NEXT TOPIC:

Security Products and Features

PREVIOUS TOPIC:

Abstract

NEED HELP?

 * Connect with an AWS IQ expert 

PrivacySite termsCookie preferences
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved.


ON THIS PAGE









DID THIS PAGE HELP YOU? - NO



Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.




Feedback