Security Learning

Why AWS?

Security in the cloud is similar to security in your on-premises data centers — only without the costs of maintaining facilities and hardware. In the cloud, you don’t have to manage physical servers or storage devices. Instead, you use software-based security tools to monitor and protect the flow of information into and of out of your cloud resources. For this reason, cloud security is a Shared Responsibility between the customer and AWS, where customers are responsible for “security in the cloud” and AWS is responsible for “security of the cloud.”

The AWS cloud allows you to scale and innovate while maintaining a secure environment. As an AWS customer, you will benefit from data centers and network architecture designed to meet the requirements of the most security-sensitive organizations. AWS infrastructure is custom-built for the cloud and is monitored 24x7 to help protect the confidentiality, integrity, and availability of our customers’ data. Browse this page to learn more about key topics, areas of research, and training opportunities for cloud security on AWS.

Use Cases

Security Documentations

Security is a key component of your decision to use the cloud. This documentation can help your organization get in-depth information about both the built-in and the configurable security of AWS services. This information goes beyond “how-to” and can help developers — as well as Security, Risk Management, Compliance, and Product teams — assess a service prior to use, determine how to use a service securely, and get updated information as new features are released. To learn more about how customers use security documentation, read the AWS Security blog post.

Documentation

Security in AWS Elastic File System
Learn more »

Documentation

Security in AWS Key Management Service
Learn more »

Documentation

Security in Amazon S3
Learn more »

Training

Organizations need individuals with deep security knowledge to help protect their business. AWS training courses enable you to build the skillset you need to meet your security and compliance objectives. With a variety of content and training materials curated by experts at AWS, you can stay up-to-date with evolving best practices and security trends in the industry — whether you’re new to the cloud or “all-in” on AWS.

Learn more about Training

Cloud Audit Academy

Cloud Audit Academy (CAA) is an AWS Security Auditing Learning Path designed for those that are in auditing, risk, and compliance roles and are involved in assessing regulated workloads in the cloud. The CAA curriculum dives into cloud-specific audit considerations and AWS best practices for security auditing aligned to global industry security and compliance frameworks.

AWS Cloud Audit Academy

AWS Security Control Domains

AWS Security Control Domain: Data Privacy
AWS Security Control Domain: Vulnerability Management
AWS Security Control Domain: Governance
AWS Security Control Domain: User Device Management
AWS Security Control Domain: Risk Management
AWS Security Control Domain: Network Management
AWS Security Control Domain: Managing Identity & Access
AWS Security Control Domain: Incident Response
AWS Security Control Domain: Configuration Management
AWS Security Control Domain: Business Continuity

AWS Security Control Domains

AWS Security Control Domains

AWS Security Control Domains

Whitepapers, Technical Guides, and Reference Materials

AWS security specialists leverage their first-hand experience to craft technical content that helps expand your knowledge of cloud security. These whitepapers, guides, and reference materials cover best practices for leading trends in the industry, including incident response, compliance in the cloud, and privacy considerations. Peruse the technical content library below to find guidance on how to securely build your future on AWS. You can also visit the AWS Architecture Center to see more best practices for security, identity, and compliance.

Content Type
1-9 (124)
Showing results: 1-9
Total results: 124
  • Date
  • Decision Guide

    Choosing an AWS cryptography service

    Help determine which AWS cryptography service is the best fit for your organization.

    HTML | PDF

    Security, Identity, & Compliance

    January 2025
  • Decision Guide

    Choosing an AWS identity service

    Help determine which AWS identity service is the best fit for your organization.

    HTML | PDF

    Security, Identity, & Compliance

    January 2025
  • This Is My Architecture

    New

    Orca Security: GenAI-powered Cloud…

    Explore how Orca Security harnesses the power of Amazon Bedrock to deliver GenAI-powered, tailored cloud security remediation for their customers. Learn how this innovative feature leverages Claude LLMs and enriched security data to provide precise, deployment-specific code and instructions, helping customers remediate cloud security issues faster and more effectively.

    Check out more resources for architecting in the #AWS​​​ cloud:

    2024-11-12
  • Whitepaper

    Featured

    Performance Efficiency Pillar – AWS…

    How to validate the performance of your architecture on AWS.

    HTML | PDF

    All Products | All Industries | Well-Architected Framework

    November 2024
  • Whitepaper

    Featured

    Operational Excellence Pillar – AWS…

    How to validate the operation of your architecture on AWS.

    HTML | PDF

    All Products | Aerospace | Agriculture | Automotive | Construction & Real Estate | Consumer Packaged Goods (CPG) | Defense | Digital Marketing | Education | Electronics | Environmental Protection | Financial Services | Game Tech | General Public Services | Genomics | Healthcare | Hospitality | Justice & Public Safety | Life Sciences | Manufacturing | Media & Entertainment | Mining & Natural Resources | Oil & Gas | Power & Utilities | Professional Services | Retail | Semiconductors | Social Services | Software & Internet | Telecommunications | Transport & Logistics | Travel | Well-Architected Framework

    November 2024
  • Whitepaper

    Featured

    AWS Well-Architected Framework

    Overview of the Well-Architected Framework to validate your work when architecting for the cloud.

    HTML | PDF

    All Products | All Industries | Well-Architected Framework

    November 2024
  • Whitepaper

    Featured

    Sustainability Pillar – AWS Well-Architected

    How to minimize the environmental impacts of running cloud workloads. Key topics include a shared responsibility model for sustainability, understanding impact, and maximizing utilization to minimize required resources and reduce downstream impacts.

    HTML | PDF

    All Products | All Industries | Well-Architected Framework

    November 2024
  • Whitepaper

    Featured

    Security Pillar – AWS Well-Architected…

    How to validate the security of your architecture on AWS.

    HTML | PDF

    All Products | All Industries | Well-Architected Framework

    November 2024
  • Whitepaper

    Featured

    Reliability Pillar – AWS Well-Architected…

    How to validate the reliability and resilience of your architecture on AWS.

    HTML | PDF

    All Products | All Industries | Well-Architected Framework

    November 2024
1 14
Contact an AWS Business Representative
Have Questions? Connect with AWS Support
Exploring security roles?
Apply today »
Want AWS Security updates?
Follow us on Twitter »