Security in IAM and Amazon STS
Cloud security at Amazon is the highest priority. As an Amazon customer, you benefit from data centers and network architectures that are built to meet the requirements of the most security-sensitive organizations.
Security is a shared responsibility between Amazon and you. The shared responsibility
model
-
Security of the cloud – Amazon is responsible for protecting the infrastructure that runs Amazon services in the Amazon Cloud. Amazon also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the Amazon Compliance Programs
. To learn about the compliance programs that apply to Amazon Identity and Access Management (IAM), see Amazon Services in Scope by Compliance Program . -
Security in the cloud – Your responsibility is determined by the Amazon service that you use. You are also responsible for other factors including the sensitivity of your data, your company's requirements, and applicable laws and regulations.
This documentation helps you understand how to apply the shared responsibility model when using Amazon Identity and Access Management (IAM) and Amazon Security Token Service (Amazon STS). The following topics show you how to configure IAM and Amazon STS to meet your security and compliance objectives. You also learn how to use other Amazon services that help you to monitor and secure your IAM resources.
Contents
- Amazon security credentials
- Amazon security audit guidelines
- Data protection in Amazon Identity and Access Management
- Logging and monitoring in Amazon Identity and Access Management
- Compliance validation for Amazon Identity and Access Management
- Resilience in Amazon Identity and Access Management
- Infrastructure security in Amazon Identity and Access Management
- Configuration and vulnerability analysis in Amazon Identity and Access Management
- Security best practices and use cases in Amazon Identity and Access Management
- Amazon managed policies for Amazon Identity and Access Management Access Analyzer