Archived
Amazon Web Services:
Overview of Security Processes
March 2020
For the latest technical content, see Best
Practices for Security, Identity & Compliance
https://aws.amazon.com/architecture/
security-identity-compliance ArchivedNotices
Customers are responsible for making their own independent assessment of the
information in this document. This document: (a) is for informational purposes only, (b)
represents current AWS product offerings and practices, which are subject to change
withou t notice, and (c) does not create any commitments or assurances from AWS and
its affiliates, suppliers or licensors. AWS products or services are provided “as is”
without warranties, representations, or conditions of any kind, whether express or
implied. The responsibilities and liabilities of AWS to its customers are controlled by
AWS agreements, and this document is not part of, nor does it modify, any agreement
between AWS and its customers.
© 20 20 Amazon Web Services, Inc. or its affiliates. All rights reserved. ArchivedContents
Introduction ................................ ................................ ................................ .......................... 1
Shared Security Responsibility Model ................................ ................................ ................ 1
AWS Security Responsibilities ................................ ................................ ......................... 2
Customer Security Responsibilities ................................ ................................ ................. 2
AWS Global Infrastructure Security ................................ ................................ .................... 3
AWS Compliance Program ................................ ................................ .............................. 3
Physical and Environmental Security ................................ ................................ .............. 4
Business Continuity Management ................................ ................................ ................... 6
Network Security ................................ ................................ ................................ .............. 7
AWS Access ................................ ................................ ................................ ................... 11
Secure Design Principles ................................ ................................ ............................... 12
Change Management ................................ ................................ ................................ ..... 12
AWS Account Security Features ................................ ................................ ................... 14
Individual User Accounts ................................ ................................ ............................... 19
Secure HTTPS Access Points ................................ ................................ ....................... 19
Security Logs ................................ ................................ ................................ .................. 20
AWS Trusted Advisor Security Checks ................................ ................................ ......... 20
AWS Config Security Checks ................................ ................................ ........................ 21
AWS Service -Specific Security ................................ ................................ ......................... 21
Compute Services ................................ ................................ ................................ .......... 21
Networking Services ................................ ................................ ................................ ...... 28
Storage Services ................................ ................................ ................................ ............ 43
Database Services ................................ ................................ ..........................
2020-AWS_Security_Whitepaper
文档预览
中文文档
186 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共186页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 思安 于 2023-10-19 06:00:40上传分享