Security in IAM and AWS STS
Cloud security at AWS is the highest priority. As an AWS customer, you benefit from data centers and network architectures that are built to meet the requirements of the most security-sensitive organizations.
Security is a shared responsibility between AWS and you. The shared responsibility
model
-
Security of the cloud – AWS is responsible for protecting the infrastructure that runs AWS services in the AWS Cloud. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the AWS Compliance Programs
. To learn about the compliance programs that apply to AWS Identity and Access Management (IAM), see AWS Services in Scope by Compliance Program . -
Security in the cloud – Your responsibility is determined by the AWS service that you use. You are also responsible for other factors including the sensitivity of your data, your company's requirements, and applicable laws and regulations.
This documentation helps you understand how to apply the shared responsibility model when using AWS Identity and Access Management (IAM) and AWS Security Token Service (AWS STS). The following topics show you how to configure IAM and AWS STS to meet your security and compliance objectives. You also learn how to use other AWS services that help you to monitor and secure your IAM resources.
Contents
- AWS security credentials
- AWS security audit guidelines
- Data protection in AWS Identity and Access Management
- Logging and monitoring in AWS Identity and Access Management
- Compliance validation for AWS Identity and Access Management
- Resilience in AWS Identity and Access Management
- Infrastructure security in AWS Identity and Access Management
- Configuration and vulnerability analysis in AWS Identity and Access Management
- AWS managed policies for AWS Identity and Access Management and Access Analyzer
- Security features outside IAM