Infrastructure security in Amazon SQS
As a managed service, Amazon SQS is protected by the Amazon global network security procedures
described in the Amazon Web Services: Overview of Security Processes
You use Amazon published API actions to access Amazon SQS through the network. Clients must support Transport Layer Security (TLS) 1.2 or later. Clients must also support cipher suites with Perfect Forward Secrecy (PFS), such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE).
You must sign requests using an access key ID and a secret access key associated with an IAM principal. Alternatively, you can use the Amazon Security Token Service (Amazon STS) to generate temporary security credentials for signing requests.
You can call these API actions from any network location, but Amazon SQS supports resource-based access policies, which can include restrictions based on the source IP address. You can also use Amazon SQS policies to control access from specific Amazon VPC endpoints or specific VPCs. This effectively isolates network access to a given Amazon SQS queue from only the specific VPC within the Amazon network. For more information, see Example 5: Deny access if it isn't from a VPC endpoint.