Compliance
The key to understanding how to meet security compliance standards on AWS is to first be familiar with the AWS Shared Responsibility model.
If you know what security framework you are targeting, you can start from the AWS Compliance Solution Guides.
AWS Service | Security Documentation | Notes |
---|---|---|
https://docs.aws.amazon.com/whitepapers/latest/nhs-cloud-security-guidance-using-aws/overall-security-governance---aws-landing-zones.html | Relevant to most of the Principles covered by the Good Practice Guide, a Landing Zone is a solution available from AWS that automatically creates an environment consisting of a set of related AWS accounts configured in such a way as to establish security (and cost-related) guardrails for AWS usage by a wide variety of teams with minimum friction. The environment includes the foundations of identity management, logging and monitoring, governance, security, and network design, the specifics of which may be implemented using decisions made in examining each of the principles covered in the overall security governance document. | |
AWS Control Tower | https://docs.aws.amazon.com/controltower/latest/userguide/security.html | AWS Control Tower is a well-architected service that can help your organization meet your compliance needs with controls and best practices. Additionally, third-party auditors assess the security and compliance of a number of the services you can use in your landing zone as a part of multiple AWS compliance programs. These include SOC, PCI, FedRAMP, HIPAA, and others. Your compliance responsibility when using AWS Control Tower is determined by the sensitivity of your data, your company’s compliance objectives, and applicable laws and regulations. |
https://docs.aws.amazon.com/config/latest/developerguide/security.html Templates for conformance packs (selected few, there are many available). Provide example mappings of controls to implementation.
| Included within the Landing Zone solution, this service tracks configuration settings of AWS resources over time against a desired-state baseline, and raises alerts (and optionally triggers remedial action) when changes are detected. The service also enables configuration to be audited, in order to demonstrate compliance (or otherwise) against a baseline. See the AWS Config Developer Guide for a detailed description of how to use it. Recommended best practice guidelines:
| |
AWS Secrets Manager |
|
|
AWS CloudTrail |
|
|
AWS EKS |
|
|
AWS CloudFormation |
|
|
AWS S3 |
| |
AWS IAM Identity Center (SSO) |
|
|
AWS Macie | Optional for the platform. a data security and data privacy service that uses machine learning (ML) and pattern matching to discover and protect your sensitive data. | |
AWS Managed Prometheus |
| |
AWS Managed Grafana |
|
GDPR
All AWS services are GDPR ready. AWS offers a GDPR-compliant Data Processing Addendum (GDPR DPA), enabling you to comply with GDPR contractual obligations. The AWS GDPR DPA is incorporated into the AWS Service Terms. The DPA applies automatically to all customers globally who require it to comply with the GDPR.
FedRamp
https://aws.amazon.com/compliance/fedramp/
All of the services we use are in scope of FedRamp. US East / West and GovCloud can leverage PATO JAB authorization.
Security Documentation for Other Tools
Github Actions - security hardening
Terraform - security model
Vanta - automated security and compliance platform.
Digital Sustainability
|
|
|
---|---|---|
AWS |
|
|
|
|
|