Security Learning

Why AWS?

Security in the cloud is similar to security in your on-premises data centers — only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources. For this reason, cloud security is a Shared Responsibility between the customer and AWS, where customers are responsible for “security in the cloud” and AWS is responsible for “security of the cloud.”

The AWS cloud allows you to scale and innovate while maintaining a secure environment. As an AWS customer, you will benefit from data centers and network architecture designed to meet the requirements of the most security-sensitive organizations. AWS infrastructure is custom-built for the cloud and is monitored 24x7 to help protect the confidentiality, integrity, and availability of our customers’ data. Browse this page to learn more about key topics, areas of research, and training opportunities for cloud security on AWS.

Use Cases

Security Documentations

Security is a key component of your decision to use the cloud. This documentation can help your organization get in-depth information about both the built-in and the configurable security of AWS services. This information goes beyond “how-to” and can help developers — as well as Security, Risk Management, Compliance, and Product teams — assess a service prior to use, determine how to use a service securely, and get updated information as new features are released. To learn more about how customers use security documentation, read the AWS Security blog post.

Documentation

Security in AWS Elastic File System
Learn more »

Documentation

Security in AWS Key Management Service
Learn more »

Documentation

Security in Amazon S3
Learn more »

Training

Organizations need individuals with deep security knowledge to help protect their business. AWS training courses enable you to build the skillset you need to meet your security and compliance objectives. With a variety of content and training materials curated by experts at AWS, you can stay up-to-date with evolving best practices and security trends in the industry — whether you’re new to the cloud or “all-in” on AWS.

Learn more about Training

Cloud Audit Academy

Cloud Audit Academy (CAA) is an AWS Security Auditing Learning Path designed for those that are in auditing, risk, and compliance roles and are involved in assessing regulated workloads in the cloud. The CAA curriculum dives into cloud-specific audit considerations and AWS best practices for security auditing aligned to global industry security and compliance frameworks.

AWS Cloud Audit Academy

AWS Security Control Domains

AWS Security Control Domain: Data Privacy
AWS Security Control Domain: Vulnerability Management
AWS Security Control Domain: Governance
AWS Security Control Domain: User Device Management
AWS Security Control Domain: Risk Management
AWS Security Control Domain: Network Management
AWS Security Control Domain: Managing Identity & Access
AWS Security Control Domain: Incident Response
AWS Security Control Domain: Configuration Management
AWS Security Control Domain: Business Continuity

AWS Security Control Domains

AWS Security Control Domains

AWS Security Control Domains

Whitepapers, Technical Guides, and Reference Materials

AWS security specialists leverage their first-hand experience to craft technical content that helps expand your knowledge of cloud security. These whitepapers, guides, and reference materials cover best practices for leading trends in the industry, including incident response, compliance in the cloud, and privacy considerations. Peruse the technical content library below to find guidance on how to securely build your future on AWS. You can also visit the AWS Architecture Center to see more best practices for security, identity, and compliance.

Content Type
1-9 (125)
Showing results: 1-9
Total results: 125
  • Date
  • Decision Guide

    Choosing an AWS cryptography service

    Help determine which AWS cryptography service is the best fit for your organization.

    HTML | PDF

    Security, Identity, & Compliance

    January 2025
  • Decision Guide

    Choosing an AWS identity service

    Help determine which AWS identity service is the best fit for your organization.

    HTML | PDF

    Security, Identity, & Compliance

    January 2025
  • This Is My Architecture

    New

    Orca Security: GenAI-powered Cloud…

    Explore how Orca Security harnesses the power of Amazon Bedrock to deliver GenAI-powered, tailored cloud security remediation for their customers. Learn how this innovative feature leverages Claude LLMs and enriched security data to provide precise, deployment-specific code and instructions, helping customers remediate cloud security issues faster and more effectively.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-11-12
  • This Is My Architecture

    New

    Firemind: Enhancing Language Learning…

    With Firemind, Lingoda has been exploring the potential of generative AI for language learning through a proof of concept project. Powered by Anthropic's Claude large language model on Amazon Bedrock, this interactive tool would allow students to practice real-world conversational scenarios, improving their fluency and confidence in a supportive environment.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-10-15
  • Decision Guide

    AWS WAF or AWS Shield?

    Help determine whether AWS WAF or AWS Shield meets your needs for a web application security service.

     HTML | PDF

    Security, Identity, & Compliance

    September 2024
  • Whitepaper

    Financial Services Grid Computing on AWS

    Best practices for using AWS for grid computing in the financial industry.

    HTML | PDF

    Compute | Security, Identity, & Compliance | Financial Services

    August 2024
  • This Is My Architecture

    New

    Swyftx: Building Automated, Secure,…

    For highly regulated environments, preventing mistakes or malicious behavior within your code reaching production is not negotiable. In this episode, cryptocurrency exchange Swyftx dives deep into how they provide their engineers with highly automated way to test, validate, and release into production that is not only automated, but secure and attestable. They show how to use AWS EKS along with open-source tooling to construct resilient build-pipelines, ControlTower to maintain segregation between accounts, IAM roles to ensure no one person has control, and how leveraging services like CloudTrail Logs, GuardDuty and Amazon Security Lake can be combined to simplify the job of achieving a strong security posture.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-07-30
  • Decision Guide

    Choosing AWS security, identity, and…

    Help you determine which AWS security, identity, and governance services are the best fit for your organization.

    HTML | PDF

    Security, Identity, & Compliance

    June 2024
  • Reference Architecture Diagram

    New

    Payor Strategic Focus Areas

    These reference architectures illustrate how payors can leverage advanced analytics and harness structured and unstructured healthcare data to enhance customer experiences, optimize resource allocation, and make informed decisions across the healthcare continuum.

    HTML | PDF | PPT

    Analytics | Machine Learning & AI | Security, Identity, & Compliance | Storage | Healthcare

    May 2024
1 14
Contact an AWS Business Representative
Have Questions? Connect with AWS Support
Exploring security roles?
Apply today »
Want AWS Security updates?
Follow us on Twitter »