Cloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations.

An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment.


More controls and increased privacy – all at a lower cost

Secure Cloud Computing

Keep Your Data Safe

The AWS infrastructure puts strong safeguards in place to help protect customer privacy. All data is stored in highly secure AWS data centers.

AWS Compliance

Meet Compliance Requirements

AWS manages dozens of compliance programs in its infrastructure. This means that segments of your compliance have already been completed.

Cost Savings

Save Money

Cut costs by using AWS data centers. Maintain the highest standard of security without having to manage your own facility.

Quick Scaling

Scale Quickly

Security scales with your AWS cloud usage. No matter the size of your business the AWS infrastructure is designed to keep data safe.

  • Infrastructure Security

    AWS provides several security capabilities and services to increase privacy and control network access. These include:

    • Network firewalls built into Amazon VPC, and web application firewall capabilities in AWS WAF let you create private networks, and control access to your instances and applications
    • Customer-controlled encryption in transit with TLS across all services
    • Connectivity options that enable private, or dedicated, connections from your office or on-premises environment
    • Automatic encryption of all traffic on the AWS global and regional networks between AWS secured facilities
    Cloud Infrastructure Security
  • DDoS Mitigation

    Availability is of paramount importance in the cloud. AWS customers benefit from AWS services and technologies built from the ground up to provide resilience in the face of DDoS attacks.

    A combination of AWS services may be used to implement a defense in depth strategy and thwart DDoS attacks. Services designed with an automatic response to DDoS help minimize time to mitigate and reduce impact.

    Learn about how to use AWS technologies like autoscaling, Amazon CloudFront and Amazon Route 53 help to mitigate Distributed Denial of Service attacks.

    Learn more about DDoS »



    Data Encryption
  • Data Encryption

    AWS offers you the ability to add an additional layer of security to your data at rest in the cloud, providing scalable and efficient encryption features. This includes:

    • Data encryption capabilities available in AWS storage and database services, such as EBS, S3, Glacier, Oracle RDS, SQL Server RDS, and Redshift
    • Flexible key management options, including AWS Key Management Service, allowing you to choose whether to have AWS manage the encryption keys or enable you to keep complete control over your keys
    • Encrypted message queues for the transmission of sensitive data using server-side encryption (SSE) for Amazon SQS
    • Dedicated, hardware-based cryptographic key storage using AWS CloudHSM, allowing you to satisfy compliance requirements

    In addition, AWS provides APIs for you to integrate encryption and data protection with any of the services you develop or deploy in an AWS environment.

    Data Encryption
  • Inventory and Configuration

    AWS offers a range of tools to allow you to move fast while still ensuring that your cloud resources comply with organizational standards and best practices. This includes:

    • A security assessment service, Amazon Inspector, that automatically assesses applications for vulnerabilities or deviations from best practices, including impacted networks, OS, and attached storage
    • Deployment tools to manage the creation and decommissioning of AWS resources according to organization standards
    • Inventory and configuration management tools, including AWS Config, that identify AWS resources and then track and manage changes to those resources over time
    • Template definition and management tools, including AWS CloudFormation to create standard, preconfigured environments
    Inventory In The Cloud
  • Monitoring and Logging

    AWS provides tools and features that enable you to see exactly what’s happening in your AWS environment. This includes:

    • Deep visibility into API calls through AWS CloudTrail, including who, what, who, and from where calls were made
    • Log aggregation options, streamlining investigations and compliance reporting
    • Alert notifications through Amazon CloudWatch when specific events occur or thresholds are exceeded

    These tools and features give you the visibility you need to spot issues before they impact the business and allow you to improve security posture, and reduce the risk profile, of your environment.

    Monitoring and Logging
  • Identity and Access Control

    AWS offers you capabilities to define, enforce, and manage user access policies across AWS services. This includes:

    AWS provides native identity and access management integration across many of its services plus API integration with any of your own applications or services.

    Inventory In The Cloud
  • Penetration Testing

    AWS continually tests its infrastructure; the results are summarized in our compliance reports. AWS customers can carry out security assessments or penetration tests against their own AWS infrastructure without prior approval for a number of core services, see our penetration testing section for more details.

    Inventory In The Cloud

Have the backing of our extensive support network every step of the way

Real-time insight through AWS Trusted Advisor

Proactive support and advocacy with a Technical Account Manager (TAM)

Learn more »

Strategic advice to create In-Depth Security Solutions

Detect and respond to security issues with the Security Operations Playbook

Learn more »

The AWS Cloud spans 69 Availability Zones within 22 geographic Regions around the world, with announced plans for 9 more Availability Zones and three more Regions in Cape Town, Jakarta, and Milan. 

Regions & Number of Availability Zones

US East
N. Virginia (6), Ohio (3)

US West
N. California (3), Oregon (4)

Asia Pacific
Hong Kong SAR (3), Mumbai (3), Osaka-Local (1), Seoul (3), Singapore (3), Sydney (3), Tokyo (4) 

Central (2*)
*Located in the Montreal metropolitan area

Mainland China
Beijing (2), Ningxia (3)

Frankfurt (3), Ireland (3), London (3), Paris (3),
Stockholm (3)

South America
Sao Paulo (3)

GovCloud (US)
US-East (3), US-West (3)

Middle East
Bahrain (3)

New Regions (coming soon)

Cape Town



Improving Continuity With Replication Between Regions

In addition to replicating applications and data across multiple data centers in the same region using Availability Zones, you can also choose to increase redundancy and fault tolerance further by replicating data between geographic regions.

Meeting Compliance and Data Residency Requirements

You retain complete control and ownership over the region in which your data is physically located, making it easy to meet regional compliance and data residency requirements.

Protecting Data with Encryption on the Global Network

All data flowing across the AWS global network that interconnects our datacenters and regions is automatically encrypted at the physical layer before it leaves our secured facilities. Additional encryption layers exist as well; for example, all VPC cross-region peering traffic, and customer or service-to-service TLS connections.

Spend less time on compliance and more time running your business

APN Partners offer hundreds of industry-leading products that are equivalent, identical to, or integrate with existing controls in your on-premises environments. These products complement the existing AWS services to enable you to deploy a comprehensive security architecture and a more seamless experience across your cloud and on-premises environments.

A high standard of data privacy

Amazon knows customers care deeply about privacy and data security, and we optimize our work to get these issues right for customers.

Contact Us »