• - Introduction
    • Security Challenges
    • Shared Responsibility
    • Security of the cloud
    • Security Services in AWS
    • AWS Security Frameworks
    • How to prioritize
    • Evolutive Path
  • 1. Quick Wins
    • Security Hub: Best Practices
    • Avoid using Root
    • WAF with managed rules
    • Billing Alarms
    • Macie: Data Policies
    • GuardDuty: Threat Detection
    • CloudTrail: Auditing
    • Assign security contacts
    • Limit Security Groups
    • Multi-Factor Authentication
    • AWS Trusted Advisor
    • IAM Access Analyzer
    • S3 Block Public Access
    • Select the region(s)
  • 2. Foundational
    • KMS: Data Encryption
    • Use multiple Availability Zones
    • Centralized user repository
    • Training plan
    • Data Backups
    • Define incident response playbooks
    • No hardcoded secrets
    • Regulatory requirements
    • Identify sensitive data
    • GuardDuty: Investigate findings
    • Security in Development
    • Vulnerabilities in applications
    • Infrastructure vulnerabilities
    • Manage instances w/Fleet Manager
    • Monitor configurations
    • Network segmentation (VPCs)
    • SCPs: Organization Policies
    • Multi-account management
  • 3. Efficient
    • Anti-Malware / EDR
    • Automations in security
    • Automate deviation correction
    • Security Champions
    • Golden Image Pipeline
    • Control Outgoing traffic
    • Create your reports for compliance
    • CIAM: security of your customers
    • Encryption in transit
    • IAM Roles: Least Privilege
    • Integration with SIEM/SOAR
    • Resilient Architecture Design
    • Shield Advanced: DDoS Mitigation
    • Tagging Strategy
    • Threat Modeling
    • Using abstract services
    • Infrastructure as code
    • VPC Flow Logs Analysis
    • WAF with Custom Rules
  • 4. Optimized
    • Detective: Root cause analysis
    • Amazon Fraud Detector
    • Advanced Automations
    • Red Team
    • Chaos Engineering
    • Context-Based Access Control
    • DevSecOps
    • Disaster Recovery
    • Blue Team
    • IAM Pipeline
    • Intelligence feeds
    • Service Catalog: Standardization
    • Sharing security tasks
  • -- Maturity Model
  • - Events calendar
  • - Webinars
  • - Assessment Tools
  • - Whitepapers, FAQ, others
    • Frequently Asked Questions
    • AWS Security Documentation
    • AWS Security Whitepapers
    • Free security services
  • - Contact
  • - Survey

  • Clear History

© 2022 Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Home > Whitepapers, FAQ, others > AWS Security Whitepapers

AWS Security Whitepapers

Risk and Regulatory Compliance Whitepaper:

https://d0.awsstatic.com/whitepapers/compliance/AWS_Risk_and_Compliance_Whitepaper.pdf

Overview of Security Processes on AWS:

https://d1.awsstatic.com/whitepapers/aws-security-whitepaper.pdf

Cybersecurity on AWS for the Financial Services Sector

https://d1.awsstatic.com/whitepapers/Security/AWS-and-Cybersecurity-in-the-Financial-Services-Sector.pdf

AWS Logical Separation Handbook

https://d1.awsstatic.com/whitepapers/compliance/AWS_Logical_Separation_Handbook.pdf

AWS Security Incident Response Guide

https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf

Classic intrusion analysis frameworks for AWS environments

https://docs.aws.amazon.com/whitepapers/latest/classic-intrusion-analysis-frameworks-for-aws-environments/classic-intrusion-analysis-frameworks-for-aws-environments.pdf#classic-intrusion-analysis-frameworks-for-aws-environments