The AWS Shared Responsibility Model

Featured APN and Marketplace Security Competency Partner Solutions

Amazon Web Services (AWS) and the AWS Partner Network (APN) places security at the heart of every offering to help you fully realize the speed and agility of the cloud. AWS integrates comprehensive security controls, superior scaling visibility, and automated security processes into its cloud infrastructure to enable a secure foundation on which you can build.

The Shared Responsibility Model (SRM) makes it easy to understand your choices for protecting your unique AWS environment, and it provides you with access to resources that can help you implement end-to-end security quickly and easily. Choose from the many cloud-ready software solutions offered by AWS and APN Security Competency Partners to meet the highest standards of data security in the cloud. The nature of the shared model, along with the robust offerings from APN Security Competency Partners, empower you with the clarity, flexibility, and control you need to build on the cloud with the utmost confidence.


Featured APN Competency Partners

aws partner competency logo

On-Demand APN and Marketplace Partner Webinars


Simplify and Accelerate Secure Application Deployments

Watch our webinar featuring AWS and Armor to learn how Armor’s automated, SaaS-based security solution helps customers secure their applications and DevOps deployments on AWS.


How Application Security Provider, Veracode, Boosted Cloud Visibility and Compliance

In our webinar with Check Point, Veracode, and AWS, learn how Veracode improved their security posture and relative compliance score by over 3035% in less than 10 months.


Protect Your Cloud Data: Investment Firm Deters Threats with SaaS Endpoint Protection

View this webinar to discover how CrowdStrike’s automated security solution on AWS provides endpoint protection to help Oak Hill Advisors keep their applications and data safe.


Gain Rapid Threat Protection with Automated DDoS and WAF Solutions

In our webinar featuring Imperva, DigiCert, and AWS, learn how Imperva’s automated, SaaS-based security solution protects DigiCert’s applications and workloads on-premises and on AWS.


How to Streamline Security and DLP Policy Management with McAfee

Check out our webinar to learn how Pacific Dental leveraged McAfee’s cloud access security broker (CASB) solution, McAfee MVISION Cloud, to manage security and data loss prevention (DLP) policies across its applications on AWS.


How Pokémon Secures Data for Hundreds of Millions of Users with Sumo Logic

Watch this webinar to learn how Pokémon leveraged security analytics and business insights from Sumo Logic to deliver a highly scalable security and compliance program.

PWP_Security_Threat Stack

Optimize the Security of Your Containerized Environment

Learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.

PWP_Security_Palo Alto Networks

How You Can Build Trust Between Your Security And Developer Teams

Discover how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster.



End-to-End Security Visibility Into Your Environments With Splunk and AWS

Learn how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.

PWP_Security_Trend Micro

Automate Container Security Using DevOps Processes on AWS With Trend Micro

Find out how Pivvot leverages Trend Micro Deep Security and AWS to meet their security, compliance, and customer requirements efficiently so they’re able to focus more on customer enablement and business growth.


How Ancestry Manages Risk in Their Application Environments With Qualys on AWS

Learn about the Qualys consolidated stack of security and compliance applications. Also discover how uses Qualys Cloud Platform on AWS to continuously assess their development and production environments, communicate risk, and reduce vulnerabilities in their applications.

Benefits of Security Solutions on AWS


Comprehensive Security and Compliance Controls

AWS regularly achieves third-party validation for thousands of global compliance requirements that we continually monitor to help you meet security and compliance standards for finance, retail, healthcare, government, and beyond. You inherit the latest security controls operated by AWS, strengthening your own compliance and certification programs, while also receiving access to tools you can use to reduce your cost and time to run your own specific security assurance requirements.


Select from the Largest Ecosystem of Security Partners

Extend the benefits of AWS by using security technology and consulting services from familiar solution providers you already know and trust. We have carefully selected providers with deep expertise and proven success securing every stage of cloud adoption, from initial migration through ongoing, day-to-day management. Easily find, buy, deploy, and manage these cloud-ready software solutions, including software as a service (SaaS) products, in a matter of minutes from AWS Marketplace. These solutions work together to help secure your data in ways not possible on-premises, with solutions available for a wide range of workloads and use cases.


Automate and Reduce Risk with Deeply Integrated Services

Automating security tasks on AWS enables you to be more secure by reducing human configuration errors and giving your team more time to focus on other work critical to your business. Select from a wide variety of deeply integrated solutions that can be combined to automate tasks in novel ways, making it easier for your security team to work closely with developer and operations teams to create and deploy code faster and more securely.

Featured APN and Marketplace Partner Content


Outcome-driven security from Armor protects AWS workloads

Rapidly detect and prevent threats in real time to boost application availability and increase visibility into your AWS and on-premises workloads using an automated security solution from Armor.


Automating your cloud compliance journey in 6 steps

Check Point has developed six steps to help you better assess, understand, and automate your compliance journey on AWS. 

Security_Trend Micro

Automated Security at the Speed of DevOps

This eBook discusses best practices for integrating security within your DevOps processes. Learn how Trend Micro can simplify and improve visibility across your hybrid and container environments.


Increase application availability with security from Imperva

In this solution brief, learn how to deploy Imperva’s automated solution to reduce security investigation times and more efficiently protect your apps and workloads from DDoS attacks, malicious bots, and other emerging threats.


DigiCert Automates Protection of their AWS Environment with Imperva

Read the case study and learn how Imperva’s SaaS Application Security solution can be used to not only discover malicious threats quickly but to effectively mitigate threats before they adversely impact your business.

PWP_Security_Palo Alto Networks

How Practice Fusion Achieved Cloud Compliance with Prisma Public Cloud

Read our eBook to learn how Prisma Public Cloud continuously monitors cloud environments and simplifies the task of managing compliance, therefore enabling Practice Fusion to build their products on AWS faster.

Security_Threat Stack

How OneLogin saved time, money, effort, and people with Threat Stack

Threat Stack makes it easy for security and DevOps teams to get granular control into their cloud infrastructure, allowing them to quickly identify and remediate vulnerabilities faster.


Watch More AWS Partner Security Webinars On-Demand

Interested in learning more? Check out our library of on-demand webinars.