Best Practices for Security, Identity, & Compliance
Learn how to meet your security and compliance goals using AWS infrastructure and services. To learn current AWS recommendations and strategies to use when designing cloud architectures with security in mind, see the Security Pillar - AWS Well-Architected Framework. To browse AWS security documentation by category, see AWS Security Documentation.
Identity & Access Management
- Documentation: Security Best Practices in IAM
- Blog: IAM Policy Types - How and When to Use Them
- Video: AWS Identity - Choosing the Right Mix of AWS IAM Policies for Scale
- Training: Introduction to AWS Identity and Access Management
- Workshops: Identity
Detection
Infrastructure Protection
- Whitepaper: AWS Best Practices for DDoS Resiliency
- Solution: WAF Automation on AWS
- Technical Guide: Guidelines for Implementing AWS WAF
- Workshop: Vulnerability Management with Amazon Inspector
- Technical Guide: AWS Security Reference Architecture
Data Protection & Privacy
- Blog: Three Common Cloud Encryption Questions and Their Answers on AWS
- Guide: Using AWS in the Context of Common Privacy and Data Protection Considerations
- Documentation: Introduction to the Cryptographic Details of AWS KMS
- Video: Building Privacy Compliance on AWS
- Video: To Europe and Beyond - Simplify Privacy Needs in New Markets
Compliance
Incident Investigation & Response

Cybersecurity Awareness Training
Help employees in your organization learn how to identify cybersecurity risks, including phishing, social engineering, and data privacy with this free, 15-minute training from Amazon. The training is offered in 11 languages, is compliant with the Web Content Accessibility Guidelines (WCAG) 2.1 AA, and includes completion certificates for compliance tracking. Deploy immediately from our website or implement our pre-packaged files in your organization’s LMS.
AWS re:Inforce 2023: Security in the Open
AWS re:Invent 2022: A day in the life of a billion requests
AWS re:Invent 2022: Protecting secrets, keys, and data - Cryptography for the long term
Most Popular
- Well-Architected: Security Pillar
- AWS Solutions: Customizations for AWS Control Tower
- AWS Solutions: Centralized Logging
- Date (Desc)
No results found.
Please select different criteria, check your spelling, or try different keywords.