100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Security Pillar AWS Well-Architected Framework Latest updated version 2025

Rating
-
Sold
-
Pages
25
Grade
A+
Uploaded on
22-03-2025
Written in
2024/2025

Security Pillar AWS Well-Architected Framework Latest updated version 2025

Institution
Security Pillar AWS Well-Architected Framework
Course
Security Pillar AWS Well-Architected Framework










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Security Pillar AWS Well-Architected Framework
Course
Security Pillar AWS Well-Architected Framework

Document information

Uploaded on
March 22, 2025
Number of pages
25
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Security Pillar AWS Well-Architected Framework
Latest updated version 2025


 Abstract and introduction


The AWS Well-Architected Framework helps you understand trade-offs for
decisions you make while building workloads on AWS. By using the
Framework, you will learn current architectural best practices for designing
and operating reliable, secure, efficient, cost-effective, and sustainable
workloads in the cloud. It provides a way for you to consistently measure
your workload against best practices and identify areas for improvement. We
believe that having well-architected workloads greatly increases the
likelihood of business success.
The framework is based on six pillars:
 Operational Excellence
 Security
 Reliability
 Performance Efficiency
 Cost Optimization
 Sustainability
This paper focuses on the security pillar. This will help you meet your
business and regulatory requirements by following current AWS
recommendations. It’s intended for those in technology roles, such as chief
technology officers (CTOs), chief information security officers (CSOs/CISOs),
architects, developers, and operations team members.
After reading this paper, you will understand AWS current recommendations
and strategies to use when designing cloud architectures with security in
mind. This paper doesn’t provide implementation details or architectural
patterns but does include references to appropriate resources for this
information. By adopting the practices in this paper, you can build
architectures that protect your data and systems, control access, and
respond automatically to security events.

,. Security foundations
The security pillar describes how to take advantage of cloud technologies to
protect data, systems, and assets in a way that can improve your security
posture. This paper provides in-depth, best-practice guidance for architecting
secure workloads on AWS.
Design principles
In the cloud, there are a number of principles that can help you strengthen
your workload security:
 Implement a strong identity foundation: Implement the principle
of least privilege and enforce separation of duties with appropriate
authorization for each interaction with your AWS resources. Centralize
identity management, and aim to eliminate reliance on long-term static
credentials.
 Maintain traceability: Monitor, alert, and audit actions and changes
to your environment in real time. Integrate log and metric collection
with systems to automatically investigate and take action.
 Apply security at all layers: Apply a defense in depth approach with
multiple security controls. Apply to all layers (for example, edge of
network, VPC, load balancing, every instance and compute service,
operating system, application, and code).
 Automate security best practices: Automated software-based
security mechanisms improve your ability to securely scale more
rapidly and cost-effectively. Create secure architectures, including the
implementation of controls that are defined and managed as code in
version-controlled templates.
 Protect data in transit and at rest: Classify your data into
sensitivity levels and use mechanisms, such as encryption,
tokenization, and access control where appropriate.
 Keep people away from data: Use mechanisms and tools to reduce
or eliminate the need for direct access or manual processing of data.
This reduces the risk of mishandling or modification and human error
when handling sensitive data.

,  Prepare for security events: Prepare for an incident by having
incident management and investigation policy and processes that align
to your organizational requirements. Run incident response simulations
and use tools with automation to increase your speed for detection,
investigation, and recovery.
Definition
Security in the cloud is composed of seven areas:
 Security foundations
 Identity and access management
 Detection
 Infrastructure protection
 Data protection
 Incident response
 Application security



 Shared responsibility
Security and Compliance is a shared responsibility between AWS and the
customer. This shared model can help relieve the customer’s operational
burden as AWS operates, manages, and controls the components from the
host operating system and virtualization layer down to the physical security
of the facilities in which the service operates. The customer assumes
responsibility and management of the guest operating system (including
updates and security patches), and other associated application software in
addition to the configuration of the AWS provided security group firewall.
Customers should carefully consider the services they choose as their
responsibilities vary depending on the services used, the integration of those
services into their IT environment, and applicable laws and regulations. The
nature of this shared responsibility also provides the flexibility and customer
control that permits the deployment. As shown in the following chart, this
differentiation of responsibility is commonly referred to as Security “of” the
Cloud versus Security “in” the Cloud.
AWS responsibility “Security of the Cloud” – AWS is responsible for
protecting the infrastructure that runs all of the services offered in the AWS
Cloud. This infrastructure is composed of the hardware, software,
networking, and facilities that run AWS Cloud services.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRAINBOOSTERS Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
640
Member since
2 year
Number of followers
249
Documents
22507
Last sold
7 hours ago

In this page you will find all documents , flashcards and package deals offered by seller BRAINBOOSTERS

4.5

339 reviews

5
264
4
29
3
21
2
5
1
20

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions