Security Technical Resources, Curated by AWS Security Experts

Welcome! Simply click one of the resources below, fill out the form once, and enjoy all of the Security content at your own pace.

  • AWS Security Reference Architecture (AWS SRA)

    AWS Security Reference Architecture (AWS SRA)

    The Amazon Web Services (AWS) Security Reference Architecture (AWS SRA) is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment.

    Learn More
  • Elevate Your Security in the Cloud

    section
  • Introduction to AWS Security

    Introduction to AWS Security

    This document is intended to provide an introduction to AWS’s approach to security, including the controls in the AWS environment and some of the products and features.

    Learn More
  • Migrate with Confidence to a Secure Cloud

    Migrate with Confidence to a Secure Cloud

    Security will always be top of the agenda in any cloud conversation, but the way we talk about it is changing.

    Read eBook »
  • Security Pillar: AWS Well-Architected Framework

    Security Pillar: AWS Well-Architected Framework

    The focus of this paper is to provide guidance to help you apply best practices, current recommendations in the design, delivery, and maintenance of secure AWS workloads.

    Read Paper »
  • Automate Threat Detection and Response in AWS

    section
  •  Continuous Monitoring and Threat Detection

    Continuous Monitoring and Threat Detection

    Amazon GuardDuty and AWS Security Hub in tandem provide continuous visibility, compliance, and detection of threats for AWS accounts and workloads.

    Read Article
  •  CloudEndure Disaster Recovery

    CloudEndure Disaster Recovery

    CloudEndure Disaster Recovery minimizes downtime and data loss by providing fast, reliable recovery of physical, virtual, and cloud-based servers into AWS Cloud.

    Read Article
  • AWS Security Hub Automated Response and Remediation: Implementation Guide

    AWS Security Hub Automated Response and Remediation: Implementation Guide

    The AWS Security Hub Automated Response and Remediation solution helps you quickly react to address threats by providing predefined response and remediation actions.

    Learn More
  • AWS Security Incident Response Guide

    AWS Security Incident Response Guide

    This guide presents an overview of the fundamentals of responding to security incidents within a customer’s AWS Cloud environment.

    Read Article
  • AWS Office Hours: Amazon GuardDuty Tips and Tricks

    AWS Office Hours: Amazon GuardDuty Tips and Tricks

    In this tech talk, we'll answer questions, such as “How do I automate responses to threat findings? How do I set up master-member across regional account?"

    Read Article
  • Comprehensive Data Protection in the Cloud

    section
  • Strengthen the security of sensitive data stored in Amazon S3 by using additional AWS services

    Strengthen the security of sensitive data stored in Amazon S3 by using additional AWS services

    In this post, we describe the AWS services that you can use to both detect and protect your data stored in Amazon Simple Storage Service (Amazon S3).

    Read Article
  • Using AWS IAM Access Analyzer

    Using AWS IAM Access Analyzer

    AWS IAM Access Analyzer helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, shared with an external entity.

    Read Article
  • Data Protection

    Data Protection

    Earning customer trust is the foundation of our business at AWS and we know you trust us to protect your most critical and sensitive assets: your data.

    Read Article
  • Network and Application Protection

    section
  • AWS Best Practices for DDoS Resiliency

    AWS Best Practices for DDoS Resiliency

    You can further improve your DDoS resilience by using an AWS architecture with specific services and by implementing additional best practices.

    Read Article
  • AWS re:Invent 2020: Introducing AWS Network Firewall

    AWS re:Invent 2020: Introducing AWS Network Firewall

    This session walks you through how to get started with AWS Network Firewall, common use cases, architecture patterns, and rules creation.

    Read Article
  • AWS WAF: Web Application Firewall

    AWS WAF: Web Application Firewall

    AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits and bots.

    Read Article
  • Overview of AWS Security: Network Security

    Overview of AWS Security: Network Security

    The AWS network has been architected to permit you to select the level of security and resiliency appropriate for your workload.

    Learn More
  • Privacy and Compliance

    section
  • Innovating Securely: Privacy

    Innovating Securely: Privacy

    In this conversation, Chad talks about how AWS helps customers safeguard privacy while still taking advantage of digital modernization opportunities.

    Watch Video
  • Amazon Web Services: Risk and Compliance

    Amazon Web Services: Risk and Compliance

    This paper outlines the mechanisms that AWS has implemented to manage risk on the AWS side of the Shared Responsibility Model, and the tools that customers can leverage.

    Read Article
  • AWS Compliance

    AWS Compliance

    Learn more about our compliance offerings and why we serve our customers best.

    Read Article
  • Monitor, Evaluate, and Demonstrate Backup Compliance with AWS Backup Audit Manager

    Monitor, Evaluate, and Demonstrate Backup Compliance with AWS Backup Audit Manager

    AWS Backup Audit Manager is a new feature of AWS Backup that helps you monitor and evaluate the compliance status of your backups to meet business and regulatory requirements.

    Read Article
  • loading
    Loading More...