AWS Public Sector Blog
Improving Security with Cloud Computing: Six Advantages of Cloud Security
Security is our number one priority, and at AWS, we have comprehensive security capabilities to protect virtually any workload. Through AWS Security services, we provide the opportunities to protect your data, monitor security-related activity, and receive automated responses. This gives our customers the ability to increase their security posture in the cloud, deliver more agile IT, and lower costs. With that in mind, here are six advantages of cloud security.
- Integration of compliance and security – You can leverage AWS activity monitoring services to detect configuration change and security events, even integrating AWS activity with your existing monitoring solutions for simplified compliance reporting. We provide compliance reports based on managing thousands of security controls inherited through the AWS platform, making it easier and faster for you to meet security and compliance requirements.
- Economies of scale apply – When organizations submit security requirements, we incorporate their feedback into the AWS security platform. All customers benefit from AWS security innovation and improvements made from customer feedback. Last year, we released hundreds of security and compliance related features and service enhancements.
- Customer focus on systems and applications – The cloud reduces the total “security surface area” that customer security experts need to manage themselves. Our shared responsibility model allows you to focus your expertise on the higher level operating system and application security management. You retain control of what security you choose to implement to protect your own content, applications, systems and networks, no differently than you would for applications in an on-premises data center.
- Visibility, homogeneity, and automation – With the cloud, you get to choose from a rich but more homogeneous set of infrastructure and capabilities. You can control down to the operating system image level what should be used in your environment. Using cloud orchestration capabilities like AWS CloudFormation, your security experts can validate a pre-defined configuration of systems and then those can be “stamped out” with all security features enabled and in place. For example, you can leverage AWS Quick Starts to automate the configuration of AWS resources to meet many compliance requirements.
- Cloud platforms as “systems containers” – Cloud platforms are “systems containers” that surround traditional systems and provide more insight into their behavior and functioning, including security issues, providing a new kind of “defense in depth.” The “container” that runs your operating systems and applications is programmable, monitorable, and reactive software. For example, without knowing anything about the internal workings of your application, once you know its normal network behavior, you can set monitoring alarms at the infrastructure level that will trigger a smart response to any unusual activity.
- Cloud, big data, security – With low-cost access to massive amounts of storage and processing capacity, our customers use the cloud to secure the cloud (they run big data analytics on security data and log data, which provides more insight into their security posture and results in a much faster remediation of issues). Leverage storage and processing power of the cloud to find the security event needles in the cloud haystack.
With the speed of innovation and increasing scale, the cloud story will only get better. AWS will continue to raise the bar in our efforts to provide our customers with an IT infrastructure and security services that deliver agility, visibility, scalability, and integrity. Our track record of operational integrity along with our rapid pace of innovation have gained the trust of government mission owners by delivering secure, agile, and cost-effective IT services.