AWS Compliance Quick Reference
AWS Compliance Quick Reference
Compliance
Quick
Reference
Guide
2018
Notices
This document is provided for informational purposes only.
It represents AWS’ current product offerings and practices as
of the date of issue of this document, which are subject to
change without notice. Customers are responsible for making
their own independent assessment of the information in this
document and any use of AWS’ products or services, each
of which is provided “as is” without warranty of any kind,
whether express or implied. This document does not create
any warranties, representations, contractual commitments,
conditions or assurances from AWS, its affiliates, suppliers
or licensors. The responsibilities and liabilities of AWS to
its customers are controlled by AWS agreements, and this
document is not part of, nor does it modify, any agreement
between AWS and its customers.
2 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
table of
CONTENTS
Overview 5
Assurance Programs 23
Business Continuity 43
Automation 47
Resources 51
Partners and Marketplace
Training
Quick Starts
3
4 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Overview
5
OV E R V I E W
We think
differently
about security
and compliance
6 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
As with everything at Amazon, the success of our security
and compliance program is primarily measured by one thing:
our customers’ success. Our customers’ requirements drive
our portfolio of compliance reports, attestations, and
certifications that enable our customers to run a secure and
compliant cloud environment.
7
OV E R V I E W
8 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
At AWS, security is our top priority. Nothing is more
important to us than protecting your data. As an AWS
customer, you benefit from a data center and network
architecture that is built to meet the requirements of the
most security-sensitive organizations.
9
OV E R V I E W
10 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
“We were able to get the cloud
infrastructure up and running
in a record amount of time, at a
much lower cost than we could
have done ourselves.”
Mark Field
CTO, Thermo Fisher Scientific
11
12 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
How We
Share
Responsibility
13
H OW W E S H A R E R E S P O N S I B I L I T Y
14 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
When you move your IT infrastructure to AWS, you adopt the
model of shared responsibility shown to the left. This shared
model reduces your operational burden because we operate,
manage, and control the layers of IT components from the host
operating system and virtualization layer down to the physical
security of the facilities in which the services operate. AWS is
responsible for the security of the cloud, and as a customer you
are responsible for security in the cloud.
15
H OW W E S H A R E R E S P O N S I B I L I T Y
16 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
When you move your IT infrastructure to AWS, you adopt
the model of shared responsibility shown below. This shared
model reduces your operational burden because we operate,
manage, and control the layers of IT components from the host
operating system and virtualization layer down to the physical
security of the facilities in which the services operate. AWS is
responsible for the security of the cloud, and as a customer you
are responsible for security in the cloud.
17
H OW W E S H A R E R E S P O N S I B I L I T Y
18 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
AWS Config
With AWS Config, you can discover existing and deleted AWS
resources, determine your overall compliance against rules,
and dive into configuration details of a resource at any point in
time. AWS Config enables compliance auditing, security analysis,
resource change tracking, and troubleshooting.
19
H OW W E S H A R E R E S P O N S I B I L I T Y
20 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
AWS Service Catalog
You can use AWS Service Catalog to create and manage catalogs
of IT services that you have approved for use on AWS, including
virtual machine images, servers, software, and databases to
complete multi-tier application architectures. AWS Service
Catalog allows you to centrally manage commonly-deployed IT
services, and helps you achieve consistent governance to meet
your compliance requirements, while enabling users to quickly
deploy the approved IT services they need.
Amazon GuardDuty
21
22 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Assurance
Programs
23
A S S U R A N C E P RO G R A M S
24 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Assurance Programs
25
A S S U R A N C E P RO G R A M S
Global
United States
Asia Pacific
Europe
26 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Our environments are continuously audited, and
our infrastructure and services are approved to
operate under several compliance standards
and industry certifications across geographies
and industries, including those shown below.
You can use these certifications to validate the
implementation and effectiveness of our security
controls. We are continually adding programs.
For the most current list, see the AWS Assurance
Programs website.
PCI DSS
AWS is a Payment Card Industry Data Security Standard
(PCI DSS) compliant service provider (since 2010), which
means that if you use AWS products and services to store,
process, or transmit cardholder data, you can rely on our
technology infrastructure as you manage your own PCI DSS
compliance certification.
ISO 27001
ISO 27001 is a widely adopted global security standard
that outlines the requirements for information security
management systems. It provides a systematic approach
to managing company and customer information that’s
based on periodic risk assessments.
27
A S S U R A N C E P RO G R A M S
AWS Artifact
You can review reports and details about more than 2,500
security controls by using AWS Artifact, our automated
compliance reporting tool available in the AWS
Management Console.
28 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
ISO 27017
ISO 27017 provides guidance about the information security
aspects of cloud computing, and recommends implementing
cloud-specific information security controls that supplement
the guidance of the ISO 27002 and ISO 27001 standards.
This code of practice provides implementation guidance
about information security controls that is specific to cloud
service providers. AWS’ attestation to the ISO 27017 guidance
demonstrates our ongoing commitment to align with globally-
recognized best practices, and also verifies that AWS has a
system of highly precise controls in place that are specific to
cloud services.
ISO 27018
ISO 27018 is a code of practice that focuses on protection
of personal data in the cloud. It is based on the information
security standard ISO 27002 and provides implementation
guidance about ISO 27002 controls that are applicable to
public cloud Personally Identifiable Information (PII).
Alignment demonstrates to you that AWS has a system of
controls in place, specifically addressing the privacy protection
of your content.
29
A S S U R A N C E P RO G R A M S
SOC
AWS System and Organization Controls (SOC) Reports are
independent third-party examination reports that demonstrate
how AWS achieves key compliance controls and objectives.
30 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
FedRAMP
A U.S. government program for ensuring standards in security
assessment, authorization, and continuous monitoring.
FedRAMP follows NIST and FISMA defined control standards.
HIPAA
The Health Insurance Portability and Accountability Act
(HIPAA) contains strict security and compliance standards
for organizations processing or storing Protected Health
Information (PHI). AWS enables covered entities and their
business associates subject to HIPAA to leverage the secure
AWS environment to process, maintain, and store PHI.
31
32 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Securing
your
content
33
S E C U R I N G YO U R CO N T E N T
34 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
AWS CloudHSM
Server-Side Encryption
35
S E C U R I N G YO U R CO N T E N T
Note: We do not access or use your content for any purpose other than to
provide you and your end users with the selected AWS services. We never use
your content for our own purposes, including marketing or advertising.
36 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
AWS Identity Access Management
Amazon Macie
37
S E C U R I N G YO U R CO N T E N T
38 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
AWS Directory Service for Microsoft Active Directory
AWS CloudTrail
AWS CloudTrail records AWS API calls and delivers log files
that include caller identity, time, source IP address, request
parameters, and response elements. You can use the call history
that CloudTrail provides to enable security analysis, resource
change tracking, and compliance auditing.
39
S E C U R I N G YO U R CO N T E N T
3
2 2 3
3 3
2 3 2
6 2 2
3 3
3
3
AWS REG IO NS
40 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Where your content is stored
AWS data centers are built in clusters in various countries
around the world. We refer to each of our data center clusters
in a given country as an AWS Region. You have access to
numerous AWS Regions around the globe, and can choose to
use one AWS Region, all AWS Regions or any combination of
AWS Regions.
You retain complete control over which AWS Region(s) your data
is physically stored in, making it easy to meet your compliance
and data residency requirements. For example, if you are
a European customer, you can choose to deploy your AWS
services exclusively in the EU (Frankfurt) Region. If you make this
choice, your content will be exclusively stored in Germany unless
you select a different AWS Region.
41
42 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
BUSINESS
CONTINUITY
43
B U S I N E S S CO N T I N U I T Y
44 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
It is important to note that:
• All data centers are online and serving customers; no data
center is “cold.” In the case of a failure, automated processes
move your data traffic away from the affected area.
45
46 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
AUTOMATION
47
AU TO M AT I O N
48 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
Amazon Inspector
49
50 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
RESOURCES
51
R E S O U RC E S
52 S E C U R I T Y & CO M P L I A N C E Q U I C K R E F E R E N C E G U I D E
TRAINING
Whether you are just starting out, building on existing IT skills,
or sharpening your cloud knowledge, AWS Training can help you
and your team advance your understanding so you can be more
effective using the cloud.
QUICK STARTS
Using our Quick Starts, you can follow best practices to begin
your AWS security configuration setup, laying a solid foundation
for meeting your global compliance requirements.
53