Today, customer concerns have evolved beyond whether or not the cloud is secure: instead, they are asking about the recommended best practices to be secure in the cloud. Customers want to know: What kind of controls are available so I know who is accessing my data and when? How do I access and audit my data so I know I’m in compliance? How can I secure a hybrid cloud environment?
Most Recent Flipbooks

In this e-book, we’ll provide answers to your most pertinent questions about your cloud security training journey. We’ll cover what to expect from your AWS Training experience and how to get started.

Discover how AWS protects the infrastructure that runs all of the services offered in the AWS Cloud. Better understand your role and responsibilities for security in the cloud and security services.

These are companies that are improving their risk posture at a more efficient rate than others, while, at the same time, optimizing their use of cloud to create new forms of business value faster.

AWS recognizes the growing need for organization-wide security skills. We are dedicated to keeping security our top priority—and helping your organization prioritize security, as well.
This checklist provides customer recommendations that align with the Well – Architected Framework Security Pillar.

Read this eBook to learn about ransomware and how AWS can help prevent ransomware attacks.
It’s no longer sufficient to leave security to specialists who watch over risk posture and control it through constraining policies. Learn how to build a culture of security in this eBook.
Benefits of AWS Security Hub reduced effort to collect and prioritize findings, automatic security checks against best practices and standards, consolidated view of findings across accounts and more!
Amazon GuardDuty is a continuous security monitoring service that analyzes and processes data sources. It uses threat intelligence feeds to identify unexpected, unauthorized, and malicious activity.
AWS Organizations is an account management service that enables you to consolidate multiple AWS accounts into an organization that you create and centrally manage.
This guide is for developers who need detailed information about the AWS Audit Manager API operations, data types, and errors.
Businesses starting to adopt AWS, expanding their footprint on AWS, or planning to enhance an AWS environment, can benefit from considering this guidance for organizing their AWS environments.
This paper discusses perimeter boundaries in terms of preventing unintended access patterns.
Background context on classic intrusion analysis frameworks, showing how the transition to the cloud undermines some of its key premises, naturally disrupting modern attacker intrusion methods.
This guide presents an overview of the fundamentals of responding to security incidents within a customer’s AWS Cloud environment.
Security at AWS starts with our core infrastructure, which is custom-built for the cloud and designed to meet the most stringent security and regulatory requirements in the world.
This Security and Compliance Quick Reference Guide (QRG) was created to give you a broad overview of how we keep AWS infrastructure secure and compliant.
The AWS network has been architected to permit you to select the level of security and resiliency appropriate for your workload.
The AWS Security Hub Automated Response and Remediation solution helps you quickly react to address threats by providing predefined response and remediation actions.
The Amazon Web Services (AWS) Security Reference Architecture (AWS SRA) is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment.