Compliance Validation for Amazon AppStream 2.0 - Amazon AppStream 2.0

Compliance Validation for Amazon AppStream 2.0

Third-party auditors assess the security and compliance of Amazon AppStream 2.0 as part of multiple AWS compliance programs. These include the following: SOC, PCI, ISO, FedRAMP, HIPAA, MTCS, ENS High, HITRUST CSF, VPAT, and others.

Note

AppStream 2.0 supports FIPS 140-2. For information about how to use AppStream 2.0 FIPS endpoints for administrative use or streaming, see Protecting Data in Transit with FIPS Endpoints.

AppStream 2.0 is also undergoing assessment for the Department of Defense (DoD) Cloud Computing Security Requirements Guide (SRG).

For a list of AWS services in scope of specific compliance programs, see AWS Services in Scope by Compliance Program. For general information, see AWS Compliance Programs.

You can download third-party audit reports using AWS Artifact. For more information, see Downloading Reports in AWS Artifact.

Your compliance responsibility when using AppStream 2.0 is determined by the sensitivity of your data, your company's compliance objectives, and applicable laws and regulations. AWS provides the following resources to help with compliance:

  • Security and Compliance Quick Start Guides – These deployment guides discuss architectural considerations and provide steps for deploying security- and compliance-focused baseline environments on AWS.

  • Architecting for HIPAA Security and Compliance Whitepaper – This whitepaper describes how companies can use AWS to create HIPAA-compliant applications.

  • AWS Compliance Resources – This collection of workbooks and guides might apply to your industry and location.

  • Evaluating Resources with Rules in the AWS Config Developer Guide – The AWS Config service assesses how well your resource configurations comply with internal practices, industry guidelines, and regulations.

  • AWS Security Hub – This AWS service provides a comprehensive view of your security state within AWS that helps you check your compliance with security industry standards and best practices.