Security Learning

Why AWS?

Security in the cloud is similar to security in your on-premises data centers — only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources. For this reason, cloud security is a Shared Responsibility between the customer and AWS, where customers are responsible for “security in the cloud” and AWS is responsible for “security of the cloud.”

The AWS cloud allows you to scale and innovate while maintaining a secure environment. As an AWS customer, you will benefit from data centers and network architecture designed to meet the requirements of the most security-sensitive organizations. AWS infrastructure is custom-built for the cloud and is monitored 24x7 to help protect the confidentiality, integrity, and availability of our customers’ data. Browse this page to learn more about key topics, areas of research, and training opportunities for cloud security on AWS.

Use Cases

Security Documentations

Security is a key component of your decision to use the cloud. This documentation can help your organization get in-depth information about both the built-in and the configurable security of AWS services. This information goes beyond “how-to” and can help developers — as well as Security, Risk Management, Compliance, and Product teams — assess a service prior to use, determine how to use a service securely, and get updated information as new features are released. To learn more about how customers use security documentation, read the AWS Security blog post.

Training

Organizations need individuals with deep security knowledge to help protect their business. AWS training courses enable you to build the skillset you need to meet your security and compliance objectives. With a variety of content and training materials curated by experts at AWS, you can stay up-to-date with evolving best practices and security trends in the industry — whether you’re new to the cloud or “all-in” on AWS.

Learn more about Training

Cloud Audit Academy

Cloud Audit Academy (CAA) is an AWS Security Auditing Learning Path designed for those that are in auditing, risk, and compliance roles and are involved in assessing regulated workloads in the cloud. The CAA curriculum dives into cloud-specific audit considerations and AWS best practices for security auditing aligned to global industry security and compliance frameworks.

AWS Cloud Audit Academy

Whitepapers, Technical Guides, and Reference Materials

AWS security specialists leverage their first-hand experience to craft technical content that helps expand your knowledge of cloud security. These whitepapers, guides, and reference materials cover best practices for leading trends in the industry, including incident response, compliance in the cloud, and privacy considerations. Peruse the technical content library below to find guidance on how to securely build your future on AWS. You can also visit the AWS Architecture Center to see more best practices for security, identity, and compliance.

Content Type
10-18 (124)
Showing results: 10-18
Total results: 124
  • Date
  • This Is My Architecture

    New

    Firemind: Enhancing Language Learning with Gen-AI-Powered Role-Play

    With Firemind, Lingoda has been exploring the potential of generative AI for language learning through a proof of concept project. Powered by Anthropic's Claude large language model on Amazon Bedrock, this interactive tool would allow students to practice real-world conversational scenarios, improving their fluency and confidence in a supportive environment.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-10-15
  • Decision Guide

    AWS WAF or AWS Shield?

    Help determine whether AWS WAF or AWS Shield meets your needs for a web application security service.

     HTML | PDF

    Security, Identity, & Compliance

    September 2024
  • Whitepaper

    Financial Services Grid Computing on AWS

    Best practices for using AWS for grid computing in the financial industry.

    HTML | PDF

    Compute | Security, Identity, & Compliance | Financial Services

    August 2024
  • This Is My Architecture

    New

    Swyftx: Building Automated, Secure, and Attestable Pipelines from Engineers to Production

    For highly regulated environments, preventing mistakes or malicious behavior within your code reaching production is not negotiable. In this episode, cryptocurrency exchange Swyftx dives deep into how they provide their engineers with highly automated way to test, validate, and release into production that is not only automated, but secure and attestable. They show how to use AWS EKS along with open-source tooling to construct resilient build-pipelines, ControlTower to maintain segregation between accounts, IAM roles to ensure no one person has control, and how leveraging services like CloudTrail Logs, GuardDuty and Amazon Security Lake can be combined to simplify the job of achieving a strong security posture.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-07-30
  • Decision Guide

    Choosing AWS security, identity, and governance services

    Help you determine which AWS security, identity, and governance services are the best fit for your organization.

    HTML | PDF

    Security, Identity, & Compliance

    June 2024
  • Reference Architecture Diagram

    New

    Payor Strategic Focus Areas

    These reference architectures illustrate how payors can leverage advanced analytics and harness structured and unstructured healthcare data to enhance customer experiences, optimize resource allocation, and make informed decisions across the healthcare continuum.

    HTML | PDF | PPT

    Analytics | Machine Learning & AI | Security, Identity, & Compliance | Storage | Healthcare

    May 2024
  • This Is My Architecture

    New

    Glidewell Dental: Precision Manufacturing in Dental Restorations using a Tailored Scalable Solution

    Your smile is unique, your teeth are unique, now imagine when you need dental work who manufacturers each individual crown or restoration. Curious? Join us for a This is My Architecture conversation with Glidewell Dental Laboratories as they break down the way in which AWS IoT Core enabled their controls engineers to improve their precision manufacturing process, prescriptive and preventative maintenance windows and introduced automated self-healing capabilities. Regardless of what your manufacturing process the AWS architecture shared in this episode encompasses the reference patterns for telemetry capture, process, automated action, support and analytics.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-05-14
  • Back to Basics

    New

    Back to Basics: Patterns for Securing Amazon EKS Clusters

    Join Avichal as he explores essential security patterns and best practices for hardening your Amazon Elastic Kubernetes Service (EKS) clusters on AWS. He covers key areas like access control, networking, encryption, auditing, and vulnerability management - ensuring end-to-end security for your Kubernetes workloads. See practical examples for implementing robust access controls using role-based access (RBAC), least privilege policies, and AWS Identity and Access Management (IAM) integration.
    Discover networking tips like private cluster endpoints, encrypted pod traffic with network policies, and secure communication between microservices. Encrypt EKS persistent data using AWS Key Management Service (KMS) customer-managed keys and automate key rotation. We also show how to isolate and rotate Kubernetes secrets securely. For monitoring and auditing, enable CloudTrail logging and set alarms on suspicious activity. Plus, get best practices on vulnerability scanning for container images and worker nodes.
    Whether using self-managed or managed node groups, these security patterns ensure regulatory compliance and align with AWS' shared responsibility model. Implement multi-layered security controls for your mission-critical AWS container workloads based on this comprehensive guidance!

    Additional Resources:

    Check out more resources for architecting in the #AWS cloud:

    2024-04-25
  • This Is My Architecture

    New

    Aqua Security: Enabling Real Time Blocking, Scalability, and High Availability in Containers

    Security is job zero, and follows a shared responsibility model at AWS. Customers often ask for Partners in securing their AWS environments according to industry, architecture or geographic specific considerations. In this episode Aqua Security shares how customers with containerized workloads running in AWS can improve their security posture with observability and threat blocking, ensuring a high availability environment for their customers. This unique approach to Agent based implementation within Amazon EKS and ECS environments helps customers in regulated industries like Financial Services to meet their security objectives.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-04-23
1 14
Contact an AWS Business Representative
Have Questions? Connect with AWS Support
Exploring security roles?
Apply today »
Want AWS Security updates?
Follow us on Twitter »