Vulnerability Management on AWS
How AWS protects its infrastructure and services through proactive defense and rapid vulnerability response.
Proactive defense at scale
Effective vulnerability management is crucial for customers who entrust their workloads to the cloud. At AWS, security is our top priority. Our approach combines continuous, automated monitoring and patching capabilities with robust response mechanisms.

Our vulnerability management framework
AWS takes proactive steps to address vulnerabilities before they can impact our customers.
Rapid vulnerability response
Vulnerabilities don't always emerge in a predictable fashion. That's why AWS has developed a comprehensive, multi-phase process to rapidly respond and reduce the impact of newly discovered security issues. By combining immediate protective measures with advanced monitoring, root cause analysis, and systematic remediation, we're able to respond to emergent and zero-day threats with unparalleled precision and speed, minimizing disruption to our customers' operations. AWS remediates emergent and zero-day vulnerabilities by patching around the clock until the fleet is secured. This is done in a way to ensure appropriate measures are in place to protect confidentiality, integrity and availability of AWS services throughout the patching process.
How AWS responds to security events
Mitigation
Our first priority in any security event is to stop potential exploitation and prevent the issue from expanding. We implement protective measures while working on permanent solutions, often developing innovative approaches like hot-patching to protect customer workloads without disruption.

Monitoring
After initial mitigation, we focus on establishing reliable methods to detect any recurrence of the issue. Our security teams analyze the vulnerability and any exploit attempts to identify distinct patterns or indicators. We then develop and implement specific monitoring mechanisms to catch these signs across our infrastructure. This step also involves determining any potential warning signs that could indicate an impending exploit, allowing us to proactively respond to similar threats in the future. By the end of this phase, we aim to have robust, targeted detection measures in place for the specific vulnerability we're addressing.

Prevention
We focus on identifying and addressing root causes through automated tooling and systematic analysis to prevent similar issues from occurring in the future. This includes updating systems, implementing new security controls, and improving our automated security tooling. Our prevention strategy emphasizes maintaining security without impacting customer workloads or requiring customer intervention.

Repair
The final phase involves thoroughly reviewing and remediating any potential impact from the vulnerability. We verify that both temporary mitigations and permanent fixes are properly implemented across all relevant services and systems. Our teams systematically validate that all affected components have been identified and patched, helping ensure no residual exposure remains. This phase also includes documenting the complete scope of repairs and confirming that our defense-in-depth strategy provides appropriate protection against similar vulnerabilities in the future.

Resources
Browse resources to learn more about vulnerability management
Report a vulnerability
Learn how to report a suspected vulnerability or security concern with AWS cloud services or open-source projects. Report
