Security at AWS is job zero. All AWS customers, no matter who they are, benefit from a data center and network architecture built to satisfy the requirements of the most security-sensitive organizations. AWS and its partners offer over 700 tools and features to help customers meet your security objectives around visibility, auditability, controllability and agility. This means that you can create a resilient environment with the security you need, but without the capital outlay, and at a much lower operational overhead than in an on-premises environment.

As AWS customers, you inherit all the best practices of AWS policies, architecture and operational processes. All AWS customers, no matter who you are, benefit from a data center and network architecture built to satisfy the requirements of our most security-sensitive customers. 

Learn more »

benefit_SecurityProductFeatures_network-security

AWS and its partners offer hundreds of tools and features to help you to meet your security objectives. AWS provides security-specific tools and features across network security, configuration management, access control and data encryption.

Learn more »

AWS provides you with guidance and expertise through online resources, personnel and partners, including Trusted Advisor, Professional Services, and Enterprise Support. AWS provides you with advisories around current issues, plus gives the opportunity to work with AWS around issues like reporting abuse, reporting vulnerabilities and other issues you encounter.

Learn more »

AWS computing environments are continuously audited, with certifications from accreditation bodies across geographies and verticals. Also, operating in an AWS environment allows you to take advantage of automated tools for tasks like asset inventory, and privileged access reporting.

Learn more »


Learn about how to use AWS technologies like autoscaling, Amazon CloudFront and Amazoun Route 53 to mitigate Distributed Denial of Service attacks.

Learn more »

 

SecurityCenter_protect-data-aws-encryption

How do you protect your private information and customer PII in the cloud when you don’t control all the hardware or software components that might access that information? AWS allows you to offload many management and data-handling tasks, but how do you evaluate the risks to your data as it passes through these services?

AWS offers many options for using encryption to protect your data in transit and at rest. Watch the video above to learn more!

SecurityCenter_identity-access-management-webinar

AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources, enabling you to control both the authentication of who is granted access and the authorization of what they are allowed to do within your AWS account.

In this webinar session, we will introduce the fundamental concepts of IAM users, groups, roles, permissions and federation and walk through how these can be applied in real-life settings ... Watch the video above to learn more!


This Forrester Wave evaluates four of the leading public clouds along 15 key security criteria and details the findings about how well each vendor fulfills our criteria and where they stand in relation to each other, to help S&R professionals select the right public cloud partner with the best options for security controls and overall security capabilities. AWS leads the pack and demonstrated not only a broad set of security capabilities in data center security, certifications, and network security, but also excelled in customer satisfaction, security services partnerships, and a large installed base.

Forrester-Wave_Public-Cloud_Thumbnail
Forrester-Wave_Public-Cloud

The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

Click image for detailed view