Security in the cloud is similar to security in your on-premises data centers — only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources. For this reason, cloud security is a Shared Responsibility between the customer and AWS, where customers are responsible for “security in the cloud” and AWS is responsible for “security of the cloud.”

The AWS cloud allows you to scale and innovate while maintaining a secure environment. As an AWS customer, you will benefit from data centers and network architecture designed to meet the requirements of the most security-sensitive organizations. AWS infrastructure is custom-built for the cloud and is monitored 24x7 to help protect the confidentiality, integrity, and availability of our customers’ data.

Browse this page to learn more about key topics, areas of research, and training opportunities for cloud security on AWS.

Whitepapers, Technical Guides, and Reference Materials

AWS security specialists leverage their first-hand experience to craft technical content that helps expand your knowledge of cloud security. These whitepapers, guides, and reference materials cover best practices for leading trends in the industry, including incident response, compliance in the cloud, and privacy considerations. Peruse the technical content library below to find guidance on how to securely build your future on AWS.

Clear filters
Date (Newest–Oldest)
  • Date (Newest–Oldest)
  • Date (Oldest–Newest)
  • Title (A–Z)
  • Title (Z–A)
No documents found that match the selected criteria.

International Content

Security and compliance requirements affect all businesses no matter where they are located. With millions of AWS customers around the world, it is important that security professionals have access to the best practices and guidance needed to help improve their security posture. This is why AWS offers key security and compliance content that is localized in over 20 languages to better support users in their preferred language.

Learn more about International Content >>

Provable Security: Research and Insights

AWS uses automated reasoning technology — the application of mathematical logic to assess cloud security — to help detect misconfigurations and answer critical questions about your infrastructure. Known as provable security, AWS leverages leading insight and applications from AWS security experts to help you achieve the highest possible level of security assurance in the cloud. 

Learn more about Provable Security >>

What is AWS Zelkova?

AWS re:Inforce 2019: Automate Compliance Verification on AWS Using Provable Security

AWS re:Inforce 2019: The Evolution of Automated Reasoning Technology at AWS

AWS re:Inforce 2019: An AWS Approach to Higher Standards of Assurance w/ Provable Security

Security Documentation

Security is a key component of your decision to use the cloud. This documentation can help your organization get in-depth information about both the built-in and the configurable security of AWS services. This information goes beyond “how-to” and can help developers — as well as Security, Risk Management, Compliance, and Product teams — assess a service prior to use, determine how to use a service securely, and get updated information as new features are released.

Learn more about Security Documentation >>


Organizations need individuals with deep security knowledge to help protect their business. AWS training courses enable you to build the skillset you need to meet your security and compliance objectives. With a variety of content and training materials curated by experts at AWS, you can stay up-to-date with evolving best practices and security trends in the industry — whether you’re new to the cloud or “all-in” on AWS. 

Learn more about Training >>

Contact an AWS Business Representative
Have Questions? Connect with an AWS Business Representative
Exploring security roles?
Apply today »
Want AWS Security updates?
Follow us on Twitter »