A growing number of military customers are adopting AWS' utility-based cloud services to process, store, and transmit Department of Defense (DoD) data.
AWS enables military organizations and their business associates to leverage the secure AWS environments to process, maintain, and store DoD data. AWS has attained provisional authorizations from the Defense Information Systems Agency (DISA).
AWS maintains two environments covered by DoD Provisional Authorizations: the US East and US West Regions and the AWS GovCloud (US) Region (for more details see the FAQ below):
- US East/West holds a DoD Impact Level (IL) 2 Provisional Authorization. The covered AWS services within US East/West that are already in scope of the DoD SRG IL2 authorization boundary can be found within AWS Services in Scope by Compliance Program.
- AWS GovCloud (US) holds DoD Provisional Authorizations at Impact Level 2 and 4. The covered AWS services within GovCloud (US) that are already in scope of the DoD SRG IL2 and IL4 authorization boundary can be found within AWS Services in Scope by Compliance Program.
As a DoD customer, you are also responsible for complying with DoD security guidance within your AWS application environment, to include the following:
• The mission owner requirements defined in the DoD Cloud Computing Security Requirements Guide (SRG)
• All relevant operating system security technical implementation guides (STIGs)
• All relevant application STIGs
• DoD ports and protocols guidance (DoDI 8551.01)
The infrastructure, governance and operating environment of AWS have been assessed and authorized through the FedRAMP and DoD authorization processes. As a customer deploying an application on the AWS infrastructure, you fully inherit the security controls pertaining to our physical, environmental and media protection controls, and no longer need to provide a detailed description as to how you comply with these control families. The remaining DoD Risk Management Framework (RMF) controls are shared between AWS and its customers, as each organization retains responsibility for implementation of these controls within their portion of the shared IT security model.
As an AWS customer, you are responsible for designing, deploying, managing and monitoring your AWS environment and applications leveraging AWS features, third party capabilities, including your own utilities, software, and applications. Using the security functionality provided by AWS and our ecosystem of vendors, you are able to build highly available systems that are also tightly controlled and monitored in accordance with your organization’s relevant policies.