Best Practices for Security, Identity, & Compliance
Last updated: April 2021
Learn how to meet your security and compliance goals using AWS infrastructure and services. For an introduction to AWS security see the Security Pillar - AWS Well-Architected Framework. For service-specific security information see AWS Security Documentation.
Featured Content
Identity & Access Management
Detection & Incident Response
- Blog: AWS Foundational Security Best Practices Standard Now Available in Security Hub
- Workshops: Detection & Response
- Video: Prepare for & Respond to Security Incidents in Your AWS Environment
- Technical Guide: AWS Security Incident Response Guide
- re:Invent: DIY Guide to Runbooks, Incident Reports, and Incident Response
Infrastructure Protection
- Whitepaper: AWS Best Practices for DDoS Resiliency
- Reference Implementation: AWS WAF Security Automations
- Technical Guide: Guidelines for Implementing AWS WAF
- Workshops: Infrastructure Security
Data Protection
- Documentation: AWS Key Management Service Cryptographic Details
- Whitepaper: Data Classification - Secure Cloud Adoption
- Compliance Guide: Using AWS in the Context of Common Privacy and Data Protection Considerations
- Workshops: Data Protection
- Blog: Three Common Cloud Encryption Questions and Their Answers on AWS
Compliance
AWS re:Invent 2020: AWS security: Where we’ve been, where we’re going
AWS re:Invent 2020: Ten easy and effective ways to secure your AWS environment
AWS re:Invent 2020: Zero Trust: An AWS perspective
Most Popular
- Well-Architected: Security Pillar
- Reference Implementation: AWS Landing Zone
- Reference Implementation: AWS WAF Security Automations
Related Resources
Filter by:
Clear all filters
Did you find what you were looking for?
Provide feedback
Security, Identity, & Compliance Blog Posts