Security in Amazon Transfer Family
Cloud security at Amazon is the highest priority. As an Amazon customer, you benefit from a data center and network architecture that is built to meet the requirements of the most security-sensitive organizations.
Security is a shared responsibility between Amazon and you. The shared responsibility model
To learn whether an Amazon Web Service is within the scope of specific compliance programs, see Amazon Web Services in Scope
by Compliance Program
You can download third-party audit reports using Amazon Artifact. For more information, see Downloading Reports in Amazon Artifact
Your compliance responsibility when using Amazon Web Services is determined by the sensitivity of your data, your company's compliance objectives, and applicable laws and regulations. Amazon provides the following resources to help with compliance:
-
Security and Compliance Quick Start Guides
– These deployment guides discuss architectural considerations and provide steps for deploying baseline environments on Amazon that are security and compliance focused. Amazon Compliance Resources
– This collection of workbooks and guides might apply to your industry and location. Evaluating Resources with Rules in the Amazon Config Developer Guide – The Amazon Config service assesses how well your resource configurations comply with internal practices, industry guidelines, and regulations.
-
Amazon Security Hub – This Amazon Web Service provides a comprehensive view of your security state within Amazon. Security Hub uses security controls to evaluate your Amazon resources and to check your compliance against security industry standards and best practices. For a list of supported services and controls, see Security Hub controls reference.
-
Amazon GuardDuty – This Amazon Web Service detects potential threats to your Amazon Web Services accounts, workloads, containers, and data by monitoring your environment for suspicious and malicious activities. GuardDuty can help you address various compliance requirements, like PCI DSS, by meeting intrusion detection requirements mandated by certain compliance frameworks.
This documentation helps you understand how to apply the shared responsibility model when using Amazon Transfer Family. The following topics show you how to configure Amazon Transfer Family to meet your security and compliance objectives. You also learn how to use other Amazon services that help you to monitor and secure your Amazon Transfer Family resources.
We offer a workshop that provides prescriptive guidance and a hands on lab on how you can build
a scalable and secure file transfer architecture on Amazon without needing to modify existing applications or manage server infrastructure.
You can view the details for this workshop
here
Topics
- Security policies for Amazon Transfer Family servers
- Security policies for Amazon Transfer Family SFTP connectors
- Using hybrid post-quantum key exchange with Amazon Transfer Family
- Data protection in Amazon Transfer Family
- Identity and access management for Amazon Transfer Family
- Compliance validation for Amazon Transfer Family
- Resilience in Amazon Transfer Family
- Infrastructure security in Amazon Transfer Family
- Add a web application firewall
- Cross-service confused deputy prevention
- Amazon managed policies for Amazon Transfer Family