AWS SOC 3 Report: Security & Privacy
AWS SOC 3 Report: Security & Privacy
You hereby agree that you will not distribute, display, or otherwise make this document available to an
individual or entity, unless expressly permitted herein. This document is AWS Confidential Information
(as defined in the AWS Customer Agreement), and you may not remove these terms and conditions from
this document, nor take excerpts of this document, without Amazon’s express written consent. You may
6a
not use this document for purposes competitive with Amazon. You may distribute this document, in its
complete form, upon the commercially reasonable request by (1) an end user of your service, to the
extent that your service functions on relevant AWS offerings provided that such distribution is
ui
accompanied by documentation that details the function of AWS offerings in your service, provided that
you have entered into a confidentiality agreement with the end user that includes terms not less
x7
restrictive than those provided herein and have named Amazon as an intended beneficiary, or (2) a
regulator, so long as you request confidential treatment of this document (each (1) and (2) is deemed a
“Permitted Recipient”). You must keep comprehensive records of all Permitted Recipient requests, and
Al
make such records available to Amazon and its auditors, upon request.
You further (i) acknowledge and agree that you do not acquire any rights against Amazon’s Service
3f
Auditors in connection with your receipt or use of this document, and (ii) release Amazon’s Service
Auditor from any and all claims or causes of action that you have now or in the future against Amazon’s
Service Auditor arising from this document. The foregoing sentence is meant for the benefit of Amazon’s
M
Service Auditors, who are entitled to enforce it. “Service Auditor” means the party that created this
document for Amazon or assisted Amazon with creating this document.
m
t9
J8
oj
PB
uM
Fl
n-
ke
-to
rm
te
6a
ui
x7
Al
3f
M
System and Organization Controls 3 (SOC 3) Report
m
t9
Report on the Amazon Web Services System
Relevant to Security, Availability, Confidentiality, and
J8
Privacy
oj
6a
Seattle, WA 98109-5210
ui
Over the Amazon Web Services System
Based on the Trust Services Criteria for Security, Availability, Confidentiality, and Privacy
x7
We, as management of Amazon Web Services, Inc., are responsible for:
Al
• Identifying the Amazon Web Services System (System) and describing the boundaries of the
System, which are presented in Attachment A
3f
• Identifying our principal service commitments and system requirements
• Identifying the risks that would threaten the achievement of our principal service commitments
M
and system requirements that are the objectives of our System, which are presented in
Attachment A
m
• Identifying, designing, implementing, operating, and monitoring effective controls over the
System to mitigate risks that threaten the achievement of the principal service commitments
t9
and system requirements
• Selecting the trust services categories and associated criteria that are the basis of our assertion
J8
We confirm to the best of our knowledge and belief that the controls over the System were effective
throughout the period April 1, 2023 to March 31, 2024, to provide reasonable assurance that the service
oj
commitments and system requirements were achieved based on the criteria relevant to security,
availability, confidentiality, and privacy set forth in the AICPA’s TSP section 100, 2017 Trust Services
PB
ui
Since 2006, Amazon Web Services (AWS) has provided flexible, scalable and secure IT infrastructure to
businesses of all sizes around the world. With AWS, customers can deploy solutions in a cloud computing
x7
environment that provides compute power, storage, and other application services over the Internet as
their business needs demand. AWS affords businesses the flexibility to employ the operating systems,
application programs, and databases of their choice.
Al
The scope of this system description includes the following services:
• Amazon API Gateway • AWS App Mesh
3f
• Amazon AppFlow • AWS App Runner
• Amazon AppStream 2.0 • AWS AppFabric
M
• Amazon Athena • AWS Application Migration Service
• Amazon Augmented AI [Excludes Public • AWS AppSync
m
Workforce and Vendor Workforce for all • AWS Artifact
features] • AWS Audit Manager
• Amazon Bedrock •
t9
AWS Backup
• Amazon Braket • AWS Batch
• Amazon Chime J8 • AWS Certificate Manager (ACM)
• Amazon Chime SDK • AWS Chatbot
• Amazon Cloud Directory • AWS Clean Rooms
• Amazon CloudFront [excludes content • AWS Cloud Map
oj
delivery through Amazon CloudFront • AWS Cloud9
Embedded Point of Presences] • AWS CloudFormation
PB
AWS Config
• Amazon DataZone • AWS Control Tower
• Amazon Detective • AWS Data Exchange
n-
ui
Amazon Elastic Kubernetes Service (EKS) AWS Firewall Manager
[both Fargate and EC2 launch types] • AWS Global Accelerator
• Amazon Elastic MapReduce (EMR) • AWS Glue
x7
• Amazon ElastiCache • AWS Glue DataBrew
• Amazon EventBridge • AWS Health Dashboard
• Amazon FinSpace • AWS HealthImaging
Al
• Amazon Forecast • AWS HealthLake
• Amazon Fraud Detector • AWS HealthOmics
• •
3f
Amazon FSx AWS IAM Identity Center
• Amazon GuardDuty • AWS Identity and Access Management
• Amazon Inspector (IAM)
M
• Amazon Inspector Classic • AWS IoT Core
• Amazon Kendra • AWS IoT Device Defender
m
• Amazon Keyspaces (for Apache Cassandra) • AWS IoT Device Management
• Amazon Kinesis Data Streams • AWS IoT Events
t9
• Amazon Kinesis Video Streams • AWS IoT Greengrass
• Amazon Lex • AWS IoT SiteWise
• Amazon Location Service • AWS IoT TwinMaker
• Amazon Macie
J8 • AWS Key Management Service (KMS)
• Amazon Managed Grafana • AWS Lake Formation
• •
oj
Amazon Managed Service for Apache Flink AWS Lambda
• Amazon Managed Service for Prometheus • AWS License Manager
• Amazon Managed Streaming for Apache • AWS Mainframe Modernization
PB
Puppet Enterprise]
• Amazon MQ • AWS OpsWorks Stacks
• Amazon Neptune • AWS Organizations
• Amazon OpenSearch Service • AWS Outposts
Fl
• Amazon Quantum Ledger Database (QLDB) • AWS Resource Access Manager (RAM)
• Amazon QuickSight • AWS Resource Groups
ke
ui
Amazon Simple Queue Service (SQS) AWS Snowmobile
• Amazon Simple Storage Service (S3) • AWS Step Functions
• Amazon Simple Workflow Service (SWF) • AWS Storage Gateway
x7
• Amazon SimpleDB • AWS Systems Manager
• Amazon Textract • AWS Transfer Family
• Amazon Timestream • AWS User Notifications
Al
• Amazon Transcribe • AWS WAF
• Amazon Translate • AWS Wickr
• •
3f
Amazon Virtual Private Cloud (VPC) AWS X-Ray
• Amazon WorkDocs • EC2 Image Builder
• Amazon WorkMail • Elastic Load Balancing (ELB)
M
• Amazon WorkSpaces • FreeRTOS
• Amazon WorkSpaces Web • VM Import/Export
m
• AWS Amplify
t9
More information about the in-scope services, can be found at the following web address:
J8
https://aws.amazon.com/compliance/services-in-scope/
The scope of locations covered in this report includes the supporting data centers located in the following
oj
regions:
PB
ui
United Arab Emirates: Middle East (UAE) (me-central-1)
• United States: US East (Northern Virginia) (us-east-1), US East (Ohio) (us-east-2), US
West (Oregon) (us-west-2), US West (Northern California) (us-west-1), AWS GovCloud
x7
(US-East) (us-gov-east-1), AWS GovCloud (US-West) (us-gov-west-1)
Al
and the following AWS Edge locations in:
3f
• Caba, Argentina • Dublin, Ireland • Bluffdale, United States
• General Pacheco, • Haifa, Israel • Boston, United States
M
Argentina • Milan, Italy • Chandler, United States
• Brisbane, Australia • Rome, Italy • Chicago, United States
m
• Canberra, Australia • Inzai, Japan • Columbus, United States
• Hume, Australia • Koto City, Japan • Dallas, United States
t9
• Melbourne, Australia • Osaka, Japan • Denver, United States
• Perth, Australia • Shinagawa, Japan
J8 • El Segundo, United States
• Sydney, Australia • Nairobi, Kenya • Elk Grove Village, United
• Vienna, Austria • Kuala Lumpur, Malaysia States
• Brussels, Belgium • Santiago de Querétaro, • Franklin, United States
oj
• Fortaleza, Brazil Mexico • Greenwood Village, United
• Rio de Janeiro, Brazil • Amsterdam, Netherlands States
PB
ui
Hamburg, Germany New Taipei City, Taiwan Reston, United States
• Munich, Germany • Taipei, Taiwan • Richardson, United States
• Kropia, Greece • Bangkok, Thailand • San Jose, United States
x7
• Budapest, Hungary • Bang Chalong, Thailand • Seattle, United States
• Bangalore, India • Dubai, United Arab • Secaucus, United States
Al
• Chennai, India Emirates • Tampa, United States
• Hyderabad, India • Fujairah, United Arab • Tempe, United States
• Kolkata, India Emirates • Vienna, United States
3f
• Mumbai, India • London, United Kingdom • West Valley City, United
• New Delhi, India • Manchester, United States
M
• Noida, India Kingdom • Hanoi, Vietnam
• Pune, India • Slough, United Kingdom • Ho Chi Minh, Vietnam
m
• Bekasi, Indonesia • Swinton, United Kingdom
• Jakarta, Indonesia • Ashburn, United States
t9
• Clonshaugh, Ireland • Atlanta, United States
ui
United States
• Muscat, Oman • Hillsboro, United States • Richardson, United States
• Lima, Peru • Houston, United States • Seattle, United States
x7
* This location is a Dedicated Local Zone and may not be available to all customers.
Infrastructure
Al
AWS operates the cloud infrastructure that customers may use to provision computing resources such as
processing and storage. The AWS infrastructure includes the facilities, network, and hardware as well as
3f
some operational software (e.g., host operating system, virtualization software, etc.) that support the
provisioning and use of these resources. The AWS infrastructure is designed and managed in accordance
M
with security compliance standards and AWS best practices.
m
AWS offers a series of Analytics; Application Integration; Business Productivity; Compute; Customer
Engagement; Database; Desktop & App Streaming; Developer Tools; Internet of Things; Management
t9
Tools; Media Services; Migration; Mobile Services; Network & Content Delivery; Security, Identity, and
Compliance; and Storage services. A description of the AWS services included within the scope of this
J8
report is listed below:
AWS Amplify
oj
AWS Amplify is a set of tools and services that can be used together or on their own, to help front-end
web and mobile developers build scalable full stack applications, powered by AWS. With Amplify,
PB
customers can configure app backend and connect applications in minutes, deploy static web apps in a
few clicks and easily manage app content outside of AWS console. Amplify supports popular web
frameworks including JavaScript, React, Angular, Vue, Next.js, and mobile platforms including Android,
iOS, React Native, Ionic, and Flutter.
uM
automatically converting customers’ source servers from physical, virtual, or cloud infrastructure to run
natively on AWS. Customers are able to use the same automated process to migrate a wide range of
applications to AWS without making changes to applications, their architecture, or the migrated servers.
n-
Amazon API Gateway is a service that makes it easy for developers to publish, maintain, monitor, and
secure APIs at any scale. With Amazon API Gateway, customers can create a custom API to code running
in AWS Lambda, and then call the Lambda code from customers' API. Amazon API Gateway can execute
-to
AWS Lambda code in a customer’s account, start AWS Step Functions state machines, or make calls to
AWS Elastic Beanstalk, Amazon EC2, or web services outside of AWS with publicly accessible HTTP
endpoints. Using the Amazon API Gateway console, customers can define customers' REST API and its
associated resources and methods, manage customers' API lifecycle, generate customers' client SDKs, and
rm
ui
better security, management, and productivity. AppFabric aggregates and normalizes SaaS data (e.g., user
event logs, user access) across SaaS applications without the need to write custom data integrations.
x7
Amazon AppFlow
Amazon AppFlow is an integration service that enables customers to securely transfer data between
Al
Software-as-a-Service (SaaS) applications like Salesforce, SAP, Zendesk, Slack, and ServiceNow, and AWS
services like Amazon S3 and Amazon Redshift. With AppFlow, customers can run data flows at enterprise
scale at the frequency they choose - on a schedule, in response to a business event, or on demand.
3f
Customers are able to configure data transformation capabilities like filtering and validation to generate
rich, ready-to-use data as part of the flow itself, without additional steps.
M
AWS App Mesh
m
AWS App Mesh is a service mesh that provides application-level networking which allows customer
services to communicate with each other across multiple types of compute infrastructure. App Mesh gives
customers end-to-end visibility and high availability for their applications. AWS App Mesh makes it easy
t9
to run services by providing consistent visibility and network traffic controls, which helps to deliver secure
services. App Mesh removes the need to update application code to change how monitoring data is
J8
collected or traffic is routed between services. App Mesh configures each service to export monitoring
data and implements consistent communications control logic across applications.
oj
AWS App Runner
AWS App Runner is a service that makes it easy for developers to quickly deploy containerized web
applications and APIs, at scale and with no prior infrastructure experience required. The service provides
PB
a simplified infrastructure-less abstraction for multi-concurrent web applications and API-based services.
With App Runner, infrastructure components like build, load balancers, certificates and application
replicas are managed by AWS. Customers simply provide their source-code (or a pre-built container
image) and get a service endpoint URL in return against which requests can be made.
uM
improves security, and reduces costs by moving a customer’s applications from their users’ physical
devices to the AWS Cloud. The Amazon AppStream 2.0 streaming protocol provides customers a
n-
responsive, fluid performance that is almost indistinguishable from a natively installed application. With
Amazon AppStream 2.0, customers can realize the agility to support a broad range of compute and storage
requirements for their applications.
ke
AWS AppSync
AWS AppSync is a service that allows customers to easily develop and manage GraphQL APIs. Once
-to
deployed, AWS AppSync automatically scales the API execution engine up and down to meet API request
volumes. AWS AppSync offers GraphQL setup, administration, and maintenance, with high availability
serverless infrastructure built in.
rm
te
ui
to AWS’ compliance documentation and AWS agreements. Customers can use AWS Artifact Reports to
download AWS security and compliance documents, such as AWS ISO certifications, Payment Card
x7
Industry (PCI), and System and Organization Control (SOC) reports. Customers can use AWS Artifact
Agreements to review, accept, and track the status of AWS agreements.
Al
Amazon Athena
Amazon Athena is an interactive query service that makes it easy to analyze data in Amazon S3 using
standard SQL. Athena is serverless, so there is no infrastructure for customers to manage. Athena is highly
3f
available; and executes queries using compute resources across multiple facilities and multiple devices in
each facility. Amazon Athena uses Amazon S3 as its underlying data store, making customers’ data highly
M
available and durable.
m
AWS Audit Manager
AWS Audit Manager helps customers continuously audit AWS usage to simplify how customers manage
t9
risk and compliance with regulations and industry standards. AWS Audit Manager makes it easier to
evaluate whether policies, procedures, and activities—also known as controls—are operating as
intended. The service offers prebuilt frameworks with controls that are mapped to well-known industry
J8
standards and regulations, full customization of frameworks and controls, and automated collection and
organization of evidence as designed by each control requirement.
oj
Amazon Augmented AI (excludes Public Workforce and Vendor Workforce for all features)
Amazon Augmented AI (A2I) is a machine learning service which makes it easy to build the workflows
PB
required for human review. Amazon A2I brings human review to all developers, removing the
undifferentiated heavy lifting associated with building human review systems or managing large numbers
of human reviewers whether it runs on AWS or not. The public and vendor workforce options of this
service are not in scope for purposes of this report.
uM
instance as determined by EC2 or ELB health checks. It allows customers to have balanced compute across
multiple AZs and scale their fleet based on usage.
n-
AWS Backup
AWS Backup is a backup service that makes it easy to centralize and automate the back up of data across
ke
AWS services in the cloud as well as on premises using the AWS Storage Gateway. Using AWS Backup, the
customers can centrally configure backup policies and monitor backup activity for AWS resources, such as
Amazon EBS volumes, Amazon RDS databases, Amazon DynamoDB tables, Amazon EFS file systems, and
-to
AWS Storage Gateway volumes. AWS Backup automates and consolidates backup tasks previously
performed service-by-service, removing the need to create custom scripts and manual processes.
rm
AWS Batch
AWS Batch enables developers, scientists, and engineers to run batch computing jobs on AWS. AWS Batch
dynamically provisions the optimal quantity and type of compute resources (e.g., CPU or memory
te
ui
full range of AWS compute services and features, such as Amazon EC2 and Spot Instances.
x7
Amazon Bedrock (Effective August 15, 2023)
Amazon Bedrock is a fully managed service that makes foundation models (FMs) from Amazon and leading
Artificial Intelligence (AI) companies available through an API, so customers can choose from various FMs
Al
to find the model that's best suited for their use case. With the Amazon Bedrock serverless experience,
customers can quickly get started, easily experiment with FMs, privately customize FMs with their own
3f
data, and seamlessly integrate and deploy them into customer applications using AWS tools and
capabilities. Agents for Amazon Bedrock are fully managed and make it easier for developers to create
generative-AI applications that can deliver up-to-date answers based on proprietary knowledge sources
M
and complete tasks for a wide range of use cases. The Foundational Models (FMs) from Amazon and
leading AI companies, made available by Amazon Bedrock, are not included in the design of the controls
m
described in the SOC report.
t9
Amazon Braket
Amazon Braket, the quantum computing service of AWS, is designed to help accelerate scientific research
and software development for quantum computing. Amazon Braket provides everything customers need
J8
to build, test, and run quantum programs on AWS, including access to different types of quantum
computers and classical circuit simulators and a unified development environment for building and
executing quantum circuits. Amazon Braket also manages the classical infrastructure required for the
oj
execution of hybrid quantum-classical algorithms. When customers choose to interact with quantum
computers provided by third-parties, Amazon Braket anonymizes the content, so that only content
PB
necessary to process the quantum task is sent to the quantum hardware provider. No AWS account
information is shared and customer data is not stored outside of AWS.
AWS Certificate Manager (ACM) is a service that lets the customer provision, manage, and deploy public
and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services
and their internal connected resources. SSL/TLS certificates are used to secure network communications
and establish the identity of websites over the Internet as well as resources on private networks. AWS
Fl
Certificate Manager removes the manual process of purchasing, uploading, and renewing SSL/TLS
certificates.
n-
AWS Chatbot
AWS Chatbot is an AWS service that enables DevOps and software development teams to use Slack or
ke
Amazon Chime chat rooms to monitor and respond to operational events in their AWS Cloud. AWS
Chatbot processes AWS service notifications from Amazon Simple Notification Service (Amazon SNS), and
forwards them to Slack or Amazon Chime chat rooms so teams can analyze and act on them. Teams can
-to
respond to AWS service events from a chat room where the entire team can collaborate, regardless of
location.
rm
Amazon Chime
Amazon Chime is a communications service that lets customers meet, chat, and place business calls inside
and outside organizations, all using a single application. With Amazon Chime, customers can conduct and
te
ui
desktop and mobile devices. Customers are also able to administer enterprise users, manage policies, and
set up SSO or other advanced features in minutes using Amazon Chime management console.
x7
Amazon Chime SDK
The Amazon Chime SDK is a set of real-time communications components that customers can use to
Al
quickly add messaging, audio, video, and screen sharing capabilities to their web or mobile applications.
Customers can use the Amazon Chime SDK to build real-time media applications that can send and receive
audio and video and allow content sharing. The Amazon Chime SDK works independently of any Amazon
3f
Chime administrator accounts and does not affect meetings hosted on Amazon Chime.
M
AWS Clean Rooms (Effective August 15, 2023)
AWS Clean Rooms helps customers and their partners more easily and securely collaborate and analyze
m
their collective datasets—without sharing or copying one another’s underlying data. With AWS Clean
Rooms, customers can create a secure data clean room in minutes and collaborate with any other
company on the AWS Cloud to generate unique insights about advertising campaigns, investment
t9
decisions, and research and development. With AWS Clean Rooms, customers can analyze data with up
to four other parties in a single collaboration. Customers can securely generate insights from multiple
J8
companies without having to write code. Customers can create a clean room, invite companies they want
to collaborate with, and select which participants can run analyses within the collaboration.
oj
AWS Cloud9
AWS Cloud9 is an integrated development environment, or IDE. The AWS Cloud9 IDE offers a rich code-
editing experience with support for several programming languages and runtime debuggers, and a built-
PB
in terminal. It contains a collection of tools that customers use to code, build, run, test, and debug
software, and helps customers release software to the cloud. Customers access the AWS Cloud9 IDE
through a web browser. Customers can configure the IDE to their preferences. Customers can switch color
uM
themes, bind shortcut keys, enable programming language-specific syntax coloring and code formatting,
and more.
Amazon Cloud Directory enables customers to build flexible cloud-native directories for organizing
hierarchies of data along multiple dimensions. Customers also can create directories for a variety of use
cases, such as organizational charts, course catalogs, and device registries. For example, customers can
n-
create an organizational chart that can be navigated through separate hierarchies for reporting structure,
location, and cost center.
ke
their application resources. Cloud Map maintains the location of these changing resources to increase
application availability.
Customers can register any application resource, such as databases, queues, microservices, and other
rm
cloud resources, with custom names. Cloud Map then constantly checks the health of resources to make
sure the location is up-to-date. The application can then query the registry for the location of the
resources needed based on the application version and deployment environment.
te
ui
AWS CloudFormation is a service to simplify provisioning of AWS resources such as Auto Scaling groups,
ELBs, Amazon EC2, Amazon VPC, Amazon Route 53, and others. Customers author templates of the
x7
infrastructure and applications they want to run on AWS, and the AWS CloudFormation service
automatically provisions the required AWS resources and their relationships as defined in these
templates.
Al
Amazon CloudFront (excludes content delivery through Amazon CloudFront Embedded Point of
Presences)
3f
Amazon CloudFront is a fast content delivery network (CDN) web service that securely delivers data,
videos, applications and APIs to customers globally with low latency and high-transfer speeds. CloudFront
M
offers the most advanced security capabilities, including field level encryption and HTTPS support,
seamlessly integrated with AWS Shield, AWS Web Application Firewall and Route 53 to protect against
m
multiple types of attacks including network and application layer DDoS attacks. These services co-reside
at edge networking locations – globally scaled and connected via the AWS network backbone – providing
a more secure, performant, and available experience for the users.
t9
CloudFront delivers customers' content through a worldwide network of Edge locations. When an end
J8
user requests content that customers serve with CloudFront, the user is routed to the Edge location that
provides the lowest latency, so content is delivered with the best possible performance. If the content is
already in that Edge location, CloudFront delivers it immediately.
oj
In addition to Edge locations, CloudFront also uses Amazon Cloud Extension (ACE). ACE is a CloudFront
infrastructure (single-rack version) deployed to a non-Amazon controlled facility, namely an internet
PB
service provider (ISP) or partner network. Note: all ACE sites have been decommissioned as of Q4 2023.
AWS CloudHSM
AWS CloudHSM is a service that allows customers to use dedicated HSMs within the AWS cloud. AWS
uM
CloudHSM is designed for applications where the use of HSMs for encryption and key storage is
mandatory.
AWS acquires these production HSM devices securely using the tamper evident authenticable (TEA) bags
Fl
from the vendors. These TEA bag serial numbers and production HSM serial numbers are verified against
data provided out-of-band by the manufacturer and logged by approved individuals in tracking systems.
n-
AWS CloudHSM allows customers to store and use encryption keys within HSMs in AWS data centers.
With AWS CloudHSM, customers maintain full ownership, control, and access to keys and sensitive data
ke
while Amazon manages the HSMs in close proximity to customer applications and data. All HSM media is
securely decommissioned and physically destroyed, verified by two personnel, prior to leaving AWS
Secure Zones.
-to
AWS CloudShell
AWS CloudShell is a browser-based shell used to securely manage, explore, and interact with your AWS
rm
resources. CloudShell is pre-authenticated with customer console credentials. Common development and
operations tools are pre-installed, so no local installation or configuration is required. With CloudShell,
customers can run scripts with the AWS Command Line Interface (AWS CLI), experiment with AWS service
te
ui
AWS CloudTrail
x7
AWS CloudTrail is a web service that records AWS activity for customers and delivers log files to a specified
Amazon S3 bucket. The recorded information includes the identity of the API caller, the time of the API
call, the source IP address of the API caller, the request parameters, and the response elements returned
Al
by the AWS service.
AWS CloudTrail provides a history of AWS API calls for customer accounts, including API calls made via the
3f
AWS Management Console, AWS SDKs, command line tools, and higher-level AWS services (such as AWS
CloudFormation). The AWS API call history produced by AWS CloudTrail enables security analysis, resource
M
change tracking, and compliance auditing.
m
Amazon CloudWatch
Amazon CloudWatch is a monitoring and management service built for developers, system operators,
site reliability engineers (SRE), and IT managers. CloudWatch provides the customers with data and
t9
actionable insights to monitor their applications, understand and respond to system-wide performance
changes, optimize resource utilization, and get a unified view of operational health. CloudWatch collects
J8
monitoring and operational data in the form of logs, metrics, and events, providing the customers with a
unified view of AWS resources, applications and services that run on AWS, and on-premises servers.
oj
Amazon CloudWatch Logs
Amazon CloudWatch Logs is a service used to monitor, store, and access log files from Amazon Elastic
Compute Cloud (EC2) instances, AWS CloudTrail, Route 53 and other sources. CloudWatch Logs enables
PB
customers to centralize the logs from systems, applications and AWS services used in a single, highly
scalable service. Customers can easily view them, search for patterns, filter on specific fields or archive
them securely for future analysis. CloudWatch Logs enables customers to view logs, regardless of their
source, as a single and consistent flow of events ordered by time, and to query them based on specific
uM
criteria.
AWS CodeBuild
AWS CodeBuild is a build service that compiles source code, runs tests, and produces software packages
Fl
that are ready to deploy. CodeBuild scales continuously and processes multiple builds concurrently, so
that customers’ builds are not left waiting in a queue. Customers can use prepackaged build environments
n-
or can create custom build environments that use their own build tools. AWS CodeBuild eliminates the
need to set up, patch, update, and manage customers’ build servers and software.
ke
AWS CodeCommit
AWS CodeCommit is a source control service that hosts secure Git-based repositories. It allows teams to
collaborate on code in a secure and highly scalable ecosystem. CodeCommit eliminates the need for
-to
customers to operate their own source control system or worry about scaling their infrastructure.
CodeCommit can be used to securely store anything from source code to binaries, and it works seamlessly
with the existing Git tools.
rm
te
ui
services such as Amazon EC2, AWS Fargate, AWS Lambda, and the customer’s on-premises servers. AWS
CodeDeploy allows customers to rapidly release new features, helps avoid downtime during application
x7
deployment, and handles the complexity of updating the applications.
AWS CodePipeline
Al
AWS CodePipeline is a continuous delivery service that helps customers automate release pipelines for
fast and reliable application and infrastructure updates. CodePipeline automates the build, test, and
deploy phases of customers release process every time there is a code change, based on the release model
3f
defined by the customer. This enables customers to rapidly and reliably deliver features and updates.
Customers can easily integrate AWS CodePipeline with third-party services such as GitHub or with their
M
own custom plugin.
m
Amazon CodeWhisperer (Effective February 15, 2024)
Amazon CodeWhisperer is a productivity tool that generates real-time, single-line or full-function code
suggestions in the customers’ integrated development environment (IDE) and in the command line to help
t9
quickly build software. Customers can quickly and easily accept the top suggestion, view more
suggestions, or continue writing their own code. J8
Amazon Cognito
Amazon Cognito lets customers add user sign-up, sign-in, and manage permissions for mobile and web
oj
applications. Customers can create their own user directory within Amazon Cognito. Customers can also
choose to authenticate users through social identity providers such as Facebook, Twitter, or Amazon; with
SAML identity solutions; or by using customers' own identity system. In addition, Amazon Cognito enables
PB
customers to save data locally on users' devices, allowing customers' applications to work even when the
devices are offline. Customers can then synchronize data across users' devices so that their app
experience remains consistent regardless of the device they use.
uM
Amazon Comprehend
Amazon Comprehend is a natural language processing (NLP) service that uses machine learning to find
insights and relationships in text. Amazon Comprehend uses machine learning to help the customers
uncover insights and relationships in their unstructured data without machine learning experience. The
Fl
service identifies the language of the text; extracts key phrases, places, people, brands, or events;
understands how positive or negative the text is; analyzes text using tokenization and parts of speech;
n-
Amazon Comprehend Medical is a HIPAA-eligible natural language processing (NLP) service that facilitates
the use of machine learning to extract relevant medical information from unstructured text. Using
Amazon Comprehend Medical, customers can quickly and accurately gather information, such as medical
-to
condition, medication, dosage, strength, and frequency from a variety of sources like doctors’ notes,
clinical trial reports, and patient health records. Amazon Comprehend Medical uses advanced machine
learning models to accurately and quickly identify medical information, such as medical conditions and
rm
medications, and determines their relationship to each other, for instance, medicine dosage and strength.
te
ui
AWS Config continuously monitors and records AWS resource configurations and allows customers to
automate the evaluation of recorded configurations against desired configurations. With AWS Config,
x7
customers can review changes in configurations and relationships between AWS resources, dive into
detailed resource configuration histories, and determine overall compliance against the configurations
specified within the customers’ internal guidelines. This enables customers to simplify compliance
Al
auditing, security analysis, change management, and operational troubleshooting.
Amazon Connect
3f
Amazon Connect is an easy-to-use omnichannel cloud contact center that helps customers provide
superior customer service across voice, chat, and tasks at lower cost than traditional contact center
M
systems. Amazon Connect simplifies contact center operations, improves agent efficiency and lowers
costs. Customers can setup a contact center in minutes that can scale to support millions of customers
m
from the office or as a virtual contact center.
t9
AWS Control Tower provides the easiest way to set up and govern a new, secure, multi-account AWS
environment based on AWS’ best practices established through AWS’ experience working with thousands
J8
of enterprises as they move to the cloud. With AWS Control Tower, builders can provision new AWS
accounts that conform to customer policies. If customers are building a new AWS environment, starting
out on the journey to AWS, starting a new cloud initiative, or are completely new to AWS, Control Tower
oj
will help customers get started quickly with governance and AWS’ best practices built-in.
Amazon DataZone is a data management service that makes it faster and easier for customers to catalog,
discover, share, and govern data stored across AWS, on premises, and third-party sources. With Amazon
DataZone, engineers, data scientists, product managers, analysts, and business users can quickly access
data throughout an organization so that they can discover, use, and collaborate to derive data-driven
uM
insights. Administrators and data owners who oversee an organization's data assets can easily manage
and govern access to data. Amazon DataZone provides built-in workflows for data consumers to request
access to data and for data owners to approve the access.
Fl
data providers include category-leading brands. Once subscribed to a data product, customers can use
the AWS Data Exchange API to load data directly into Amazon S3 and then analyze it with a wide variety
of AWS analytics and machine learning services. For data providers, AWS Data Exchange makes it easy to
ke
reach the millions of AWS customers migrating to the cloud by removing the need to build and maintain
infrastructure for data storage, delivery, billing, and entitling.
-to
migrate data into the AWS Cloud, between on-premises instances (through AWS Cloud setup), or between
combinations of cloud and on-premises setups. The service supports homogenous migrations within one
te
ui
AWS DataSync
x7
AWS DataSync is an online data transfer service that simplifies, automates and accelerates moving data
between on-premises storage and AWS Storage services, as well as between AWS Storage services.
DataSync can copy data between Network File System (NFS), Server Message Block (SMB) file servers, self-
Al
managed object storage, AWS Snowcone, Amazon Simple Storage Service (Amazon S3) buckets, Amazon
EFS file systems and Amazon FSx for Windows File Server file systems. DataSync automatically handles
many of the tasks related to data transfers that can slow down migrations or burden customers’ IT
3f
operations, including running customers own instances, handling encryption, managing scripts, network
optimization, and data integrity validation.
M
Amazon Detective
m
Amazon Detective allows customers to easily analyze, investigate, and quickly identify the root cause of
potential security issues or suspicious activity. Amazon Detective collects log data from customer’s AWS
resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data
t9
that enables customers to conduct faster and more efficient security investigations. AWS Security services
can be used to identify potential security issues or findings.
J8
Amazon Detective can analyze trillions of events from multiple data sources and automatically creates a
unified, interactive view of the resources, users, and the interactions between them over time. With this
oj
unified view, customers can visualize all the details and context in one place to identify the underlying
reasons for the findings, drill down into relevant historical activities, and quickly determine the root cause.
PB
DevOps Guru uses ML models informed by years of Amazon.com and AWS operational excellence to
identify anomalous application behavior (for example, increased latency, error rates, resource constraints,
and others) and helps surface critical issues that could cause potential outages or service disruptions.
Fl
When DevOps Guru identifies a critical issue, it automatically sends an alert and provides a summary of
related anomalies, the likely root cause, and context for when and where the issue occurred. When
n-
possible, DevOps Guru also helps provide recommendations on how to remediate the issue.
AWS Direct Connect enables customers to establish a dedicated network connection between their
network and one of the AWS Direct Connect locations. Using AWS Direct Connect, customers can establish
private connectivity between AWS and their data center, office, or colocation environment.
-to
Directory (AD), enables customers' directory-aware workloads and AWS resources to use managed Active
Directory in the AWS Cloud. AWS Managed Microsoft AD stores directory content in encrypted Amazon
Elastic Block Store volumes using encryption keys. Data in transit to and from Active Directory clients is
te
ui
travels to customers' VPC by a virtual private network link or an AWS Direct Connect link.
x7
Amazon DocumentDB (with MongoDB compatibility)
Amazon DocumentDB (with MongoDB compatibility) is a fast, scalable, and highly available document
database service that supports MongoDB workloads. Amazon DocumentDB is designed from the ground-
Al
up to give customers the performance, scalability, and availability customers need when operating
mission-critical MongoDB workloads at scale. Amazon DocumentDB implements the Apache 2.0 open
source MongoDB 3.6 API by emulating the responses that a MongoDB client expects from a MongoDB
3f
server, allowing customers to use their existing MongoDB drivers and tools with Amazon DocumentDB.
Amazon DocumentDB uses a distributed, fault-tolerant, self-healing storage system that auto-scales up to
M
64 TB per database cluster.
Amazon DynamoDB
m
Amazon DynamoDB is a managed NoSQL database service. Amazon DynamoDB enables customers to
offload to AWS the administrative burdens of operating and scaling distributed databases such as
t9
hardware provisioning, setup and configuration, replication, software patching, and cluster scaling.
J8
Customers can create a database table that can store and retrieve data and serve any requested traffic.
Amazon DynamoDB automatically spreads the data and traffic for the table over a sufficient number of
servers to handle the request capacity specified and the amount of data stored, while maintaining
consistent, fast performance. All data items are stored on Solid State Drives (SSDs) and are automatically
oj
replicated across multiple AZs in a region.
PB
memory acceleration to your DynamoDB tables, without requiring developers to manage cache
invalidation, data population, or cluster management.
EC2 Image Builder makes it easier to automate the creation, management, and deployment of
customized, secure, and up-to-date “golden” server images that are pre-installed and pre-configured with
n-
AWS Elastic Beanstalk is an application container launch program for customers to launch and scale their
applications on top of AWS. Customers can use AWS Elastic Beanstalk to create new environments using
Elastic Beanstalk curated programs and their applications, deploy application versions, update application
-to
configurations, rebuild environments, update AWS configurations, monitor environment health and
availability, and build on top of the scalable infrastructure provided by underlying services such as Auto
Scaling, Elastic Load Balancing, Amazon EC2, Amazon VPC, Amazon Route 53, and others.
rm
te
ui
instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its AZ to protect
customers from component failure. Amazon EBS allows customers to create storage volumes from 1 GB
x7
to 16 TB that can be mounted as devices by Amazon EC2 instances. Storage volumes behave like raw,
unformatted block devices, with user supplied device names and a block device interface. Customers can
create a file system on top of Amazon EBS volumes, or use them in any other way one would use a block
Al
device (e.g., a hard drive).
Amazon EBS volumes are presented as raw unformatted block devices that have been wiped prior to being
3f
made available for use. Wiping occurs before reuse. If customers have procedures requiring that all data
be wiped via a specific method, customers can conduct a wipe procedure prior to deleting the volume for
M
compliance with customer requirements. Amazon EBS includes Data Lifecycle Manager, which provides a
simple, automated way to back up data stored on Amazon EBS volumes.
m
Amazon Elastic Compute Cloud (EC2)
Amazon Elastic Compute Cloud (EC2) is Amazon’s Infrastructure as a Service (IaaS) offering, which
t9
provides scalable computing capacity using server instances in AWS’ data centers. Amazon EC2 is designed
to make web-scale computing easier by enabling customers to obtain and configure capacity with minimal
J8
friction. Customers create and launch instances, which are virtual machines that are available in a wide
variety of hardware and software configurations.
oj
Security within Amazon EC2 is provided on multiple levels: the operating system (OS) of the host layer,
the virtual instance OS or guest OS, a firewall, and signed API calls. Each of these items builds on the
capabilities of the others. This helps prevent data contained within Amazon EC2 from being intercepted
PB
by unauthorized systems or users and to provide Amazon EC2 instances themselves security without
sacrificing flexibility of configuration. The Amazon EC2 service utilizes a hypervisor to provide memory
and CPU isolation between virtual machines and controls access to network, storage, and other devices,
uM
and maintains strong isolation between guest virtual machines. Independent auditors regularly assess the
security of Amazon EC2 and penetration teams regularly search for new and existing vulnerabilities and
attack vectors.
Fl
AWS prevents customers from accessing physical hosts or instances not assigned to them by filtering
through the virtualization software.
n-
Amazon EC2 provides a complete firewall solution, referred to as a Security Group; this mandatory
inbound firewall is configured in a default deny-all mode and Amazon EC2 customers must explicitly open
ke
Amazon provides a Time Sync function for time synchronization in EC2 Linux instances with the
-to
Coordinated Universal Time (UTC). It is delivered over the Network Time Protocol (NTP) and uses a fleet
of redundant satellite-connected and atomic clocks in each region to provide a highly accurate reference
clock via the local 169.254.169.123 IP address. Irregularities in the Earth’s rate of rotation that cause UTC
to drift with respect to the International Celestial Reference Frame (ICRF), by an extra second, are called
rm
leap second. Time Sync addresses this clock drift by smoothing out leap seconds over a period of time
(commonly called leap smearing) which makes it easy for customer applications to deal with leap seconds.
te
ui
to store, manage, and deploy Docker container images. Amazon Elastic Container Registry is integrated
with Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS).
x7
Amazon Elastic Container Service [both Fargate and EC2 launch types]
Amazon Elastic Container Service is a highly scalable, high performance container management service
Al
that supports Docker containers and allows customers to easily run applications on a managed cluster of
Amazon EC2 instances. Amazon Elastic Container Service eliminates the need for customers to install,
operate, and scale customers' own cluster management infrastructure. With simple API calls, customers
3f
can launch and stop Docker-enabled applications, query the complete state of customers' clusters, and
access many familiar features like security groups, Elastic Load Balancing, EBS volumes, and IAM roles.
M
Customers can use Amazon Elastic Container Service to schedule the placement of containers across
customers' clusters based on customers' resource needs and availability requirements.
m
AWS Elastic Disaster Recovery
AWS Elastic Disaster Recovery minimizes downtime and data loss with the recovery of on-premises and
t9
cloud-based applications using affordable storage, minimal compute, and point-in-time recovery.
Customers can set up AWS Elastic Disaster Recovery on their source servers to initiate secure data
J8
replication. Customer content is replicated to a staging area subnet in their AWS account, in the AWS
Region they select. The staging area design reduces costs by using affordable storage and minimal
compute resources to maintain ongoing replication. Customers can perform non-disruptive tests to
oj
confirm that implementation is complete. During normal operation, customers can maintain readiness by
monitoring replication and periodically performing non-disruptive recovery and failback drills. If
customers need to recover applications, they can launch recovery instances on AWS within minutes, using
PB
Amazon Elastic Kubernetes Service (EKS) [both Fargate and EC2 launch types]
Amazon Elastic Kubernetes Service (EKS) makes it easy to deploy, manage, and scale containerized
uM
applications using Kubernetes on AWS. Amazon EKS runs the Kubernetes management infrastructure for
the customer across multiple AWS AZs to eliminate a single point of failure. Amazon EKS is certified
Kubernetes conformant so the customers can use existing tooling and plugins from partners and the
Kubernetes community. Applications running on any standard Kubernetes environment are fully
Fl
attached file system interface via the NFS v4 protocol. EFS file systems grow and shrink elastically as data
is added and deleted by users. Amazon EFS spreads data across multiple AZs; in the event that an AZ is
not reachable, the structure allows customers to still access their full set of data.
-to
The customer is responsible for choosing which of their Virtual Private Clouds (VPCs) they want a file
system to be accessed from by creating resources called mount targets. One mount target exists for each
rm
AZ, which exposes an IP address and DNS name for mounting the customer’s file system onto their EC2
instances. Customers then log into their EC2 instance and issue a ‘mount’ command, pointing at their
mount target’ IP address or DNS name. A mount target is assigned one or more VPC security groups to
te
ui
Elastic Load Balancing (ELB)
x7
Elastic Load Balancing (ELB) provides customers with a load balancer that automatically distributes
incoming application traffic across multiple Amazon EC2 instances in the cloud. It allows customers to
achieve greater levels of fault tolerance for their applications, seamlessly providing the required amount
Al
of load balancing capacity needed to distribute application traffic.
Amazon ElastiCache
3f
Amazon ElastiCache automates management tasks for in-memory cache environments, such as patch
management, failure detection, and recovery. It works in conjunction with other AWS services to provide
M
a managed in-memory cache. For example, an application running in Amazon EC2 can securely access an
Amazon ElastiCache Cluster in the same region with very slight latency.
m
Using the Amazon ElastiCache service, customers create a Cache Cluster, which is a collection of one or
more Cache Nodes, each running an instance of the Memcached, Redis Engine, or DAX Engine. A Cache
t9
Node is a self-contained environment which provides a fixed-size chunk of secure, network-attached RAM.
Each Cache Node runs an instance of the Memcached, Redis Engine, or DAX Engine, and has its own DNS
J8
name and port. Multiple types of Cache Nodes are supported, each with varying amounts of associated
memory.
oj
AWS Elemental MediaConnect
AWS Elemental MediaConnect is a high-quality transport service for live video. MediaConnect enables
customers to build mission-critical live video workflows in a fraction of the time and cost of satellite or
PB
fiber services. Customers can use MediaConnect to ingest live video from a remote event site (like a
stadium), share video with a partner (like a cable TV distributor), or replicate a video stream for processing
(like an over-the-top service). MediaConnect combines reliable video transport, highly secure stream
sharing, and real-time network traffic and video monitoring that allow customers to focus on their
uM
allows customers to create video-on-demand (VOD) content for broadcast and multiscreen delivery at
scale. The service combines advanced video and audio capabilities with a simple web services interface.
n-
With AWS Elemental MediaConvert, customers can focus on delivering media experiences without having
to worry about the complexity of building and operating video processing infrastructure.
ke
TVs, tablets, smart phones, and set-top boxes. The service works by encoding live video streams in real-
time, taking a larger-sized live video source and compressing it into smaller versions for distribution to
viewers. AWS Elemental MediaLive enables customers to focus on creating live video experiences for
rm
viewers without the complexity of building and operating video processing infrastructure.
te
ui
stored across multiple applications, channels, and data stores. AWS Entity Resolution offers matching
techniques, such as rule-based, machine learning (ML) model-powered, and data service provider
x7
matching to help them more accurately link related sets of customer information, product codes, or
business data codes.
Al
Amazon Elastic MapReduce (EMR)
Amazon Elastic MapReduce (EMR) is a web service that provides managed Hadoop clusters on Amazon
EC2 instances running a Linux operating system. Amazon EMR uses Hadoop processing combined with
3f
several AWS products to do such tasks as web indexing, data mining, log file analysis, machine learning,
scientific simulation, and data warehousing. Amazon EMR actively manages clusters for customers,
M
replacing failed nodes and adjusting capacity as requested. Amazon EMR securely and reliably handles a
broad set of big data use cases, including log analysis, web indexing, data transformations (ETL), machine
m
learning, financial analysis, scientific simulation, and bioinformatics.
Amazon EventBridge
t9
Amazon EventBridge delivers a near real-time stream of events that describe changes in AWS resources.
Customers can configure routing rules to determine where to send collected data to build application
J8
architectures that react in real time to the data sources. Amazon EventBridge becomes aware of
operational changes as they occur and responds to these changes by taking corrective action as necessary
by sending message to respond to the environment, activating functions, making changes and capturing
oj
state information.
AWS Fault Injection Service is a fully managed service for running fault injection experiments to improve
an application’s performance, observability, and resiliency. FIS simplifies the process of setting up and
running controlled fault injection experiments across a range of AWS services, so teams can build
confidence in their application behavior.
uM
Amazon FinSpace
Amazon FinSpace is a data management and analytics service that makes it easy to store, catalog, and
prepare financial industry data at scale. Amazon FinSpace reduces the time it takes for financial services
Fl
industry (FSI) customers to find and access all types of financial data for analysis.
n-
manage AWS WAF rules across customer accounts and applications. Using Firewall Manager, customers
can roll out AWS WAF rules for their Application Load Balancers and Amazon CloudFront distributions
across accounts in AWS Organizations. As new applications are created, Firewall Manager also allows
-to
customers to bring new applications and resources into compliance with a common set of security rules
from day one.
rm
Amazon Forecast
Amazon Forecast uses machine learning to combine time series data with additional variables to build
forecasts. With Amazon Forecast, customers can import time series data and associated data into Amazon
te
ui
optimizes a customer’s custom model and hosts them in a highly available environment where it can be
used to generate business forecasts.
x7
Amazon Forecast is protected by encryption. Any content processed by Amazon Forecast is encrypted
with customer keys through Amazon Key Management Service and encrypted at rest in the AWS Region
Al
where a customer is using the service. Administrators can also control access to Amazon Forecast through
an AWS Identity and Access Management (IAM) permissions policy – ensuring that sensitive information
is kept secure and confidential.
3f
Amazon Fraud Detector
M
Amazon Fraud Detector helps detect suspicious online activities such as the creation of fake accounts and
online payment fraud. Amazon Fraud Detector uses machine learning (ML) and 20 years of fraud detection
m
expertise from AWS and Amazon.com to automatically identify fraudulent activity to catch more fraud,
faster. With Amazon Fraud Detector, customers can create a fraud detection ML model with just a few
clicks and use it to evaluate online activities in milliseconds.
t9
FreeRTOS J8
FreeRTOS is an operating system for microcontrollers that makes small, low-power edge devices easy to
program, deploy, secure, connect, and manage. FreeRTOS extends the FreeRTOS kernel, a popular open
source operating system for microcontrollers, with software libraries that make it easy to securely connect
oj
the small, low-power devices to AWS cloud services like AWS IoT Core or to more powerful edge devices
running AWS IoT Greengrass.
PB
Amazon FSx
Amazon FSx provides third-party file systems. Amazon FSx provides the customers with the native
compatibility of third-party file systems with feature sets for workloads such as Windows-based storage,
high-performance computing (HPC), machine learning, and electronic design automation (EDA). The
uM
customers don’t have to worry about managing file servers and storage, as Amazon FSx automates the
time-consuming administration tasks such as hardware provisioning, software configuration, patching,
and backups. Amazon FSx integrates the file systems with cloud-native AWS services, making them even
more useful for a broader set of workloads.
Fl
Amazon S3 Glacier
n-
Amazon S3 Glacier is an archival storage solution for data that is infrequently accessed for which retrieval
times of several hours are suitable. Data in Amazon S3 Glacier is stored as an archive. Archives in Amazon
S3 Glacier can be created or deleted, but archives cannot be modified. Amazon S3 Glacier archives are
ke
organized in vaults. All vaults created have a default permission policy that only permits access by the
account creator or users that have been explicitly granted permission. Amazon S3 Glacier enables
customers to set access policies on their vaults for users within their AWS Account. User policies can
-to
express access criteria for Amazon S3 Glacier on a per vault basis. Customers can enforce Write Once Read
Many (WORM) semantics for users through user policies that forbid archive deletion.
rm
ui
for different AWS Regions and AZs.
x7
AWS Glue
AWS Glue is an extract, transform, and load (ETL) service that makes it easy for customers to prepare and
load their data for analytics. The customers can create and run an ETL job with a few clicks in the AWS
Al
Management Console.
3f
AWS Glue DataBrew is a visual data preparation tool that makes it easy for data analysts and data
scientists to clean and normalize data to prepare it for analytics and machine learning. Customers can
M
choose from pre-built transformations to automate data preparation tasks, all without the need to write
any code.
m
Amazon GuardDuty
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and
t9
unauthorized behavior to protect the customers’ AWS accounts and workloads. With the cloud, the
collection and aggregation of account and network activities is simplified, but it can be time consuming
J8
for security teams to continuously analyze event log data for potential threats. With GuardDuty, the
customers now have an intelligent and cost-effective option for continuous threat detection in the AWS
Cloud.
oj
AWS HealthImaging (Effective August 15, 2023)
AWS HealthImaging is a service that helps healthcare and life science organizations and their software
PB
partners to store, analyze, and share medical imaging data at petabyte scale. With HealthImaging,
customers can reduce the total cost of ownership (TCO) of their medical imaging applications up to 40%
by running their medical imaging applications from a single copy of patient imaging data in the cloud. With
sub-second image retrieval latencies for active and archive data, customers can realize the cost savings of
uM
the cloud without sacrificing performance at the point-of-care. HealthImaging removes the burden of
managing infrastructure for customer imaging workflows so that they can focus on delivering quality
patient care.
Fl
AWS HealthLake
AWS HealthLake is a service offering healthcare and life sciences companies a complete view of individual
n-
or patient population health data for query and analytics at scale. Using the HealthLake APIs, health
organizations can easily copy health data, such as imaging medical reports or patient notes, from on-
premises systems to a secure data lake in the cloud. HealthLake uses machine learning (ML) models to
ke
automatically understand and extract meaningful medical information from the raw data, such as
medications, procedures, and diagnoses. HealthLake organizes and indexes information and stores it in
the Fast Healthcare Interoperability Resources (FHIR) industry standard format to provide a complete view
-to
AWS HealthOmics helps Healthcare and Life Sciences organizations process, store, and analyze genomics
and other omics data at scale. The service supports a wide range of use cases, including DNA and RNA
sequencing (genomics and transcriptomics), protein structure prediction (proteomics), and more. By
te
ui
outcomes, and advance scientific discoveries.
x7
HealthOmics is comprised of three service components. Omics Storage efficiently ingests raw genomic
data into the Cloud, and it uses domain-specific compression to offer attractive storage prices to
customers. It also offers customers the ability to seamlessly access their data from various compute
Al
environments. Omics Workflows runs bioinformatics workflows at scale in a fully-managed compute
environment. It supports three common bioinformatics domain-specific workflow languages. Omics
Analytics stores genomic variant and annotation data and allows customers to efficiently query and
3f
analyze at scale.
M
AWS Identity and Access Management (IAM)
AWS Identity and Access Management is a web service that helps customers securely control access to
m
AWS resources for their users. Customers use IAM to control who can use their AWS resources
(authentication) and what resources they can use and in what ways (authorization). Customers can grant
other people permission to administer and use resources in their AWS account without having to share
t9
their password or access key. Customers can grant different permissions to different people for different
resources. Customers can use IAM features to. securely give applications that run on EC2 instances the
J8
credentials that they need in order to access other AWS resources, like S3 buckets and RDS or DynamoDB
databases.
oj
Amazon Inspector (Effective August 15, 2023)
Amazon Inspector is an automated vulnerability management service that continually scans AWS
workloads for software vulnerabilities and unintended network exposure. Amazon Inspector removes the
PB
operational overhead associated with deploying and configuring a vulnerability management solution by
allowing customers to deploy Amazon Inspector across all accounts with a single step.
Amazon Inspector Classic is an automated security assessment service for customers seeking to improve
the security and compliance of applications deployed on AWS. Amazon Inspector Classic automatically
assesses applications for vulnerabilities or deviations from leading practices. After performing an
assessment, Amazon Inspector Classic produces a detailed list of security findings prioritized by level of
Fl
severity.
n-
across different kinds of connected devices and locations so that customers can easily build IoT
applications such as industrial solutions and connected home solutions.
-to
customers the ability to enforce consistent security policies across their AWS IoT device fleet and respond
quickly when devices are compromised. AWS IoT Device Defender provides tools to identify security issues
te
ui
AWS IoT Device Management
x7
AWS IoT Device Management provides customers with the ability to securely onboard, organize, and
remotely manage IoT devices at scale. With AWS IoT Device Management, customers can register their
connected devices individually or in bulk and manage permissions so that devices remain secure.
Al
Customers can also organize their devices, monitor and troubleshoot device functionality, query the state
of any IoT device in the fleet, and send firmware updates over-the-air (OTA). AWS IoT Device Management
3f
is agnostic to device type and OS, so customers can manage devices from constrained microcontrollers to
connected cars all with the same service. AWS IoT Device Management allows customers to scale their
M
fleets and reduce the cost and effort of managing large and diverse IoT device deployments.
m
AWS IoT TwinMaker (Effective August 15, 2023)
AWS IoT TwinMaker makes it easier for developers to create digital twins of real-world systems such as
buildings, factories, industrial equipment, and production lines. AWS IoT TwinMaker provides the tools
t9
customers need to build digital twins to help them optimize building operations, increase production
output, and improve equipment performance. With the ability to use existing data from multiple sources,
J8
create virtual representations of any physical environment, and combine existing 3D models with real-
world data, customers can now harness digital twins to create a holistic view of their operations faster
and with less effort.
oj
AWS IoT Events
AWS IoT Events is a service that detects events across thousands of IoT sensors sending different
PB
telemetry data, such as temperature from a freezer, humidity from respiratory equipment, and belt speed
on a motor. Customers can select the relevant data sources to ingest, define the logic for each event using
simple ‘if-then-else’ statements, and select the alert or custom action to trigger when an event occurs.
IoT Events continuously monitors data from multiple IoT sensors and applications, and it integrates with
uM
other services, such as AWS IoT Core, to enable early detection and unique insights into events. IoT Events
automatically triggers alerts and actions in response to events based on the logic defined to resolve issues
quickly, reduce maintenance costs, and increase operational efficiency.
Fl
generate, while still using the cloud for management, analytics, and durable storage. With AWS IoT
Greengrass, connected devices can run AWS Lambda functions, execute predictions based on machine
learning models, keep device data in sync, and communicate with other devices securely – even when not
ke
AWS IoT SiteWise is a service that enables industrial enterprises to collect, store, organize, and visualize
thousands of sensor data streams across multiple industrial facilities. AWS IoT SiteWise includes software
that runs on a gateway device that sits onsite in a facility, continuously collects the data from a historian
rm
or a specialized industrial server, and sends it to the AWS Cloud. With the service, customers can skip
months of developing undifferentiated data collection and cataloging solutions, and focus on using their
data to detect and fix equipment issues, spot inefficiencies, and improve production output.
te
ui
Amazon Kendra is an intelligent search service powered by machine learning. Kendra reimagines
enterprise search for customer websites and applications so employees and customers can easily find
x7
content, even when it's scattered across multiple locations and content repositories.
Al
AWS Key Management Service (KMS) allows users to create and manage cryptographic keys. One class of
keys, KMS keys, are designed to never be exposed in plaintext outside the service. KMS keys can be used
to encrypt data directly submitted to the service. KMS keys can also be used to protect other types of
3f
keys, Data Encryption Keys (DEKs), which are created by the service and returned to the user’s application
for local use. AWS KMS only creates and returns DEKs to users; the service does not store or manage DEKs.
M
AWS KMS is integrated with several AWS services so that users can request that resources in those
m
services are encrypted with unique DEKs provisioned by KMS that are protected by a KMS key the user
chooses at the time the resource is created. See in-scope services integrated with KMS at
https://aws.amazon.com/kms/. Integrated services use the DEK from AWS KMS. DEKs provisioned by
t9
AWS KMS are encrypted with a 256-bit key unique to the customer’s account under a defined mode of
AES – Advanced Encryption Standard. J8
When a customer requests AWS KMS to create a KMS key, the service creates a key ID for the KMS key
and key material, referred to as a backing key, which is tied to the key ID of the KMS key. The 256-bit
oj
backing key can only be used for encrypt or decrypt operations by the service. KMS will generate an
associated key ID if a customer chooses to import their own key. If the customer chooses to enable key
rotation for a KMS key with a backing key that the service generated, AWS KMS will create a new version
PB
of the backing key for each rotation event, but the key ID remains the same. All future encrypt operations
under the key ID will use the newest backing key, while all previous versions of backing keys are retained
to decrypt ciphertexts created under the previous version of the key. Backing keys and customer-imported
keys are encrypted under AWS-controlled keys when created/imported and they are only ever stored on
uM
All requests to AWS KMS APIs are logged and available in the AWS CloudTrail of the requester and the
owner of the key. The logged requests provide information about who made the request, under which
Fl
KMS key, and describes information about the AWS resource that was protected through the use of the
KMS key. These log events are visible to the customer after turning on AWS CloudTrail in their account.
n-
AWS KMS creates and manages multiple distributed replicas of KMS keys and key metadata automatically
to enable high availability and data durability. KMS keys themselves are regional objects; KMS keys can
ke
only be used in the AWS region in which they were created. KMS keys are only stored on persistent disk
in encrypted form and in two separate storage systems to ensure durability. When a KMS key is needed
to fulfill an authorized customer request, it is retrieved from storage, decrypted on one of many AWS KMS
-to
hardened security modules (HSM) in the region, then used only in memory to execute the cryptographic
operation (e.g., encrypt or decrypt). Future requests to use the KMS key each require the decryption of
the KMS key in memory for another one-time use.
rm
AWS KMS endpoints are only accessible via TLS using the following cipher suites that support forward
secrecy:
te
ui
• AES_128_GCM_SHA256
• CHACHA20_POLY1305_SHA256
x7
• ECDHE_RSA_WITH_AES_256_GCM_SHA384
• ECDHE_RSA_WITH_AES_128_GCM_SHA256
Al
• ECDHE_RSA_WITH_AES_256_CBC_SHA384
• ECDHE_RSA_WITH_AES_256_CBC_SHA
3f
• ECDHE_RSA_WITH_AES_128_CBC_SHA256
M
• ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
• DHE_RSA_WITH_AES_256_CBC_SHA256
m
• DHE_RSA_WITH_AES_128_CBC_SHA256
•
t9
DHE_RSA_WITH_AES_256_CBC_SHA
• DHE_RSA_WITH_AES_128_CBC_SHA J8
By design, no one can gain access to KMS key material. KMS keys are only ever present on hardened
security modules for the amount of time needed to perform cryptographic operations under them. AWS
oj
employees have no tools to retrieve KMS keys from these hardened security modules. In addition, multi-
party access controls are enforced for operations on these hardened security modules that involve
PB
changing the software configuration or introducing new hardened security modules into the service.
These multi-party access controls minimize the possibility of an unauthorized change to the hardened
security modules, exposing key material outside the service, or allowing unauthorized use of customer
keys. Additionally, key material used for disaster recovery processes by KMS are physically secured such
uM
that no AWS employee can gain access. Access attempts to recovery key materials are reviewed by
authorized operators on a periodic basis. Roles and responsibilities for those cryptographic custodians
with access to systems that store or use key material are formally documented and acknowledged.
Fl
same Cassandra application code and developer tools that customers use today. Amazon Keyspaces is
serverless and gives customers the performance, elasticity, and enterprise features customers need to
ke
Amazon Managed Service for Apache Flink is an easy way for customers to analyze streaming data, gain
actionable insights, and respond to business and customer needs in real time. Amazon Managed Service
for Apache Flink reduces the complexity of building, managing, and integrating streaming applications
with other AWS services. SQL users can easily query streaming data or build entire streaming applications
rm
using templates and an interactive SQL editor. Java developers can quickly build sophisticated streaming
te
ui
Amazon Data Firehose
x7
Amazon Data Firehose is a reliable way to load streaming data into data stores and analytics tools. It can
capture, transform, and load streaming data into Amazon S3, Amazon Redshift, and Amazon OpenSearch
Service enabling near real-time analytics with existing business intelligence tools and dashboards
Al
customers are already using today. The service automatically scales to match the throughput of the
customers’ data and requires no ongoing administration. It can also batch, compress, transform, and
encrypt the data before loading it, minimizing the amount of storage used at the destination and
3f
increasing security.
M
Amazon Kinesis Data Streams
Amazon Kinesis Data Streams is a massively scalable and durable real-time data streaming service. Kinesis
m
Data Streams can continuously capture gigabytes of data per second from hundreds of thousands of
sources such as website clickstreams, database event streams, financial transactions, social media feeds,
IT logs and location-tracking events. The collected data is available in milliseconds to enable real-time
t9
analytics use cases such as real-time dashboards, real-time anomaly detection, dynamic pricing and more.
video for live and on-demand viewing, and quickly build applications that take advantage of computer
vision and video analytics.
Amazon Location Service makes it easy for developers to add location functionality to applications without
compromising data security and user privacy. With Amazon Location Service, customers can build
applications that provide maps and points of interest, convert street addresses into geographic
Fl
coordinates, calculate routes, track resources, and trigger actions based on location. Amazon Location
Service uses high-quality geospatial data to provide maps, places, routes, tracking, and geofencing.
n-
catalog, transform, and secure their data and make it available for analysis and ML. AWS Lake Formation
gives customers a central console where they can discover data sources, set up transformation jobs to
move data to an Amazon Simple Storage Service (S3) data lake, remove duplicates and match records,
-to
catalog data for access by analytic tools, configure data access and security policies, and audit and control
access from AWS analytic and ML services. Lake Formation automatically manages access to the registered
data in Amazon S3 through services including AWS Glue, Amazon Athena, Amazon Redshift, Amazon
QuickSight, and Amazon EMR to ensure compliance with customer defined policies. With AWS Lake
rm
Formation, customers can configure and manage their data lake without manually integrating multiple
underlying AWS services.
te
ui
AWS Lambda lets customers run code without provisioning or managing servers on their own. AWS
Lambda uses a compute fleet of Amazon Elastic Compute Cloud (Amazon EC2) instances across multiple
x7
AZs in a region, which provides the high availability, security, performance, and scalability of the AWS
infrastructure.
Al
Amazon Lex
Amazon Lex is a service for building conversational interfaces into any application using voice and text.
Amazon Lex provides the advanced deep learning functionalities of automatic speech recognition (ASR)
3f
for converting speech to text, and natural language understanding (NLU) to recognize the intent of the
text, to enable customers to build applications with highly engaging user experiences and lifelike
M
conversational interactions. Amazon Lex scales automatically, so customers do not need to worry about
managing infrastructure.
m
AWS License Manager
AWS License Manager makes it easier to manage licenses in AWS and on-premises servers from software
t9
vendors. AWS License Manager allows customer’s administrators to create customized licensing rules that
emulate the terms of their licensing agreements, and then enforces these rules when an instance of EC2
J8
gets launched. Customer administrators can use these rules to limit licensing violations, such as using
more licenses than an agreement stipulates or reassigning licenses to different servers on a short-term
basis. The rules in AWS License Manager also enable customers to limit a licensing breach by stopping the
oj
instance from launching or by notifying the customer administrators about the infringement. Customer
administrators gain control and visibility of all their licenses with the AWS License Manager dashboard
and reduce the risk of non-compliance, misreporting, and additional costs due to licensing overages.
PB
AWS License Manager integrates with AWS services to simplify the management of licenses across
multiple AWS accounts, IT catalogs, and on-premises, through a single AWS account.
uM
Amazon Macie
Amazon Macie is a data security and data privacy service that uses machine learning and pattern matching
to help customers discover, monitor, and protect their sensitive data in AWS.
Fl
Macie automates the discovery of sensitive data, such as personally identifiable information (PII) and
financial data, to provide customers with a better understanding of the data that organization stores in
n-
Amazon Simple Storage Service (Amazon S3). Macie also provides customers with an inventory of the S3
buckets, and it automatically evaluates and monitors those buckets for security and access control. Within
minutes, Macie can identify and report overly permissive or unencrypted buckets for the organization.
ke
If Macie detects sensitive data or potential issues with the security or privacy of customer content, it
creates detailed findings for customers to review and remediate as necessary. Customers can review and
-to
analyze these findings directly in Macie, or monitor and process them by using other services, applications,
and systems.
rm
ui
Modernization built-in development tools to replatform or refactor their mainframe and legacy
workloads, test workload performance and functionality, and migrate their data to AWS.
x7
Amazon Managed Grafana
Amazon Managed Grafana is a service for open source Grafana, providing interactive data visualization
Al
for monitoring and operational data. Using Amazon Managed Grafana, customers can visualize, analyze,
and alarm on their metrics, logs, and traces collected from multiple data sources in their observability
system, including AWS, third-party ISVs, and other resources across their IT portfolio. Amazon Managed
3f
Grafana offloads the operational management of Grafana by automatically scaling compute and database
infrastructure as usage demands increase, with automated version updates and security
M
patching. Amazon Managed Grafana natively integrates with AWS services so customers can securely add,
query, visualize, and analyze their AWS data across multiple accounts and regions with a few clicks in the
m
AWS Console. Amazon Managed Grafana integrates with AWS IAM Identity Center and supports Security
Assertion Markup Language (SAML) 2.0, so customers can set up user access to specific dashboards and
data sources for only certain users in their corporate directory.
t9
AWS Managed Services J8
AWS Managed Services provides ongoing management of a customer’s AWS infrastructure. AWS
Managed Services automates common activities such as change requests, monitoring, patch
management, security, and backup services, and provides full-lifecycle services to provision, run, and
oj
support a customer’s infrastructure.
Amazon Managed Service for Prometheus is a Prometheus-compatible monitoring and alerting service
that facilitates monitoring of containerized applications and infrastructure at scale. The Cloud Native
Computing Foundation’s Prometheus project is an open source monitoring and alerting solution
optimized for container environments. With Amazon Managed Service for Prometheus, customers can
uM
use the open source Prometheus query language (PromQL) to monitor and alert on the performance of
containerized workloads, without having to scale and operate the underlying infrastructure. Amazon
Managed Service for Prometheus automatically scales the ingestion, storage, alerting, and querying of
Fl
operational metrics as workloads grow or shrink, and it is integrated with AWS security services to enable
fast and secure access to data.
n-
their current, familiar Apache Airflow platform to orchestrate their workflows. Customers gain improved
scalability, availability, and security without the operational burden of managing underlying
infrastructure. Amazon Managed Workflows for Apache Airflow orchestrates customer’s workflows using
Directed Acyclic Graphs (DAGs) written in Python. Customers provide Amazon Managed Workflows for
-to
Apache Airflow an Amazon Simple Storage Service (S3) bucket where customer’s DAGs, plugins, and
Python requirements reside. Then customers can run and monitor their DAGs from the AWS Management
Console, a command line interface (CLI), a software development kit (SDK), or the Apache Airflow user
rm
interface (UI).
te
ui
run applications that use Apache Kafka to process streaming data. Apache Kafka is an open-source
platform for building real-time streaming data pipelines and applications. With Amazon MSK, customers
x7
can use Apache Kafka APIs to populate data lakes, stream changes to and from databases, and power
machine learning and analytics applications.
Al
Amazon MemoryDB for Redis
Amazon MemoryDB for Redis is a Redis-compatible, durable, in-memory database service. It is purpose-
built for modern applications with microservices architectures.
3f
Amazon MemoryDB for Redis is compatible with Redis, an open source data store, enabling customers to
M
quickly build applications using the same flexible Redis data structures, APIs, and commands that they
already use today. With Amazon MemoryDB for Redis, all of the customer’s data is stored in memory,
m
which enables the customer to achieve microsecond read and single-digit millisecond write latency and
high throughput. Amazon MemoryDB for Redis also stores data durably across multiple AZs using a
distributed transactional log to enable fast failover, database recovery, and node restarts. Delivering both
t9
in-memory performance and Multi-AZ durability, Amazon MemoryDB for Redis can be used as a high-
performance primary database for microservices applications eliminating the need to separately manage
J8
both a cache and durable database.
Amazon MQ
oj
Amazon MQ is a managed message broker service for Apache ActiveMQ that sets up and operates
message brokers in the cloud. Message brokers allow different software systems – often using different
programming languages, and on different platforms – to communicate and exchange information.
PB
Messaging is the communications backbone that connects and integrates the components of distributed
applications, such as order processing, inventory management, and order fulfillment for e-commerce.
Amazon MQ manages the administration and maintenance of ActiveMQ, a popular open-source message
broker.
uM
Amazon Neptune
Amazon Neptune is a fast and reliable graph database service that makes it easy to build and run
Fl
applications that work with highly connected datasets. The core of Amazon Neptune is a purpose-built,
high-performance graph database engine optimized for storing billions of relationships and querying the
graph with milliseconds latency. Amazon Neptune supports popular graph models, Property Graph, and
n-
W3C's RDF, and their respective query languages Apache, TinkerPop Gremlin, and SPARQL, allowing
customers to easily build queries that efficiently navigate highly connected datasets. Neptune powers
ke
graph use cases such as recommendation engines, fraud detection, knowledge graphs, drug discovery,
and network security.
AWS Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that
may impact customers. While the AWS Health Dashboard displays the general status of AWS services,
AWS Health Dashboard gives customers a personalized view into the performance and availability of the
rm
ui
Dashboard, alerts are triggered by changes in the health of AWS resources, giving event visibility, and
guidance to help quickly diagnose and resolve issues.
x7
AWS Network Firewall
AWS Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention
Al
service for customer virtual private cloud (VPC). With Network Firewall, customers can filter traffic at the
perimeter of customer VPC. This includes filtering traffic going to and coming from an internet gateway,
NAT gateway, or over VPN or AWS Direct Connect.
3f
Amazon OpenSearch Service
M
Amazon OpenSearch Service is a service that makes it easy for the customer to deploy, secure, and
operate OpenSearch cost effectively at scale. Amazon OpenSearch Service lets the customers pay only for
m
what they use – there are no upfront costs or usage requirements. With Amazon OpenSearch Service, the
customers get the ELK stack they need, without the operational overhead.
t9
AWS OpsWorks Stacks
AWS OpsWorks Stacks is an application and server management service. OpsWorks Stacks lets customers
J8
manage applications and servers on AWS and on-premises. With OpsWorks Stacks, customers can model
their application as a stack containing different layers, such as load balancing, database, and application
server. They can deploy and configure Amazon EC2 instances in each layer or connect other resources
oj
such as Amazon RDS databases. OpsWorks Stacks also lets customers set automatic scaling for their
servers based on preset schedules or in response to changing traffic levels, and it uses lifecycle hooks to
orchestrate changes as their environment scales.
PB
suite of automation tools from Chef for configuration management, compliance and security, and
continuous deployment. OpsWorks also maintains customers’ Chef server by automatically patching,
updating, and backing up customer servers. OpsWorks eliminates the need for customers to operate their
own configuration management systems or worry about maintaining its infrastructure. OpsWorks gives
Fl
customers access to all of the Chef Automate features, such as configuration and compliance
management, which customers manage through the Chef console or command line tools like Knife. It also
works seamlessly with customers’ existing Chef cookbooks.
n-
AWS OpsWorks for Puppet Enterprise is a configuration management service that hosts Puppet
ke
Enterprise, a set of automation tools from Puppet for infrastructure and application management.
OpsWorks also maintains customers’ Puppet master server by automatically patching, updating, and
backing up customers’ servers. OpsWorks eliminates the need for customers to operate their own
-to
configuration management systems or worry about maintaining its infrastructure. OpsWorks gives
customers’ access to all of the Puppet Enterprise features, which customers manage through the Puppet
console. It also works seamlessly with customers’ existing Puppet code.
rm
AWS Organizations
AWS Organizations helps customers centrally govern their environment as customers grow and scale their
workloads on AWS. Whether customers are a growing startup or a large enterprise, Organizations helps
te
ui
Using AWS Organizations, customers can automate account creation, create groups of accounts to reflect
x7
their business needs, and apply policies for these groups for governance. Customers can also simplify
billing by setting up a single payment method for all of their AWS accounts. Through integrations with
other AWS services, customers can use Organizations to define central configurations and resource
Al
sharing across accounts in their organization.
AWS Outposts
3f
AWS Outposts is a service that extends AWS infrastructure, AWS services, APIs and tools to any data
center, co-location space, or an on-premises facility for a consistent hybrid experience. AWS Outposts is
M
ideal for workloads that require low latency access to on-premises systems, local data processing or local
data storage. Outposts offer the same AWS hardware infrastructure, services, APIs and tools to build and
m
run applications on premises and in the cloud. AWS compute, storage, database and other services run
locally on Outposts and customers can access the full range of AWS services available in the Region to
build, manage and scale on-premises applications. Service Link is established between Outposts and the
t9
AWS region by use of a secured VPN connection over the public internet or AWS Direct Connect.
J8
AWS Outposts are configured with a Nitro Security Key (NSK) which is designed to encrypt customer
content and give customers the ability to mechanically remove content from the device. Customer
content is cryptographically shredded if a customer removes the NSK from an Outpost device.
oj
Additional information about Security in AWS Outposts, including the shared responsibility model, can be
found in the AWS Outposts User Guide.
PB
hardware security modules (HSMs). This elastic, pay-as-you-go AWS API service allows credit, debit, and
payment processing applications to move to the cloud without the need for dedicated payment HSMs.
AWS Private Certificate Authority (CA) is a managed private CA service enables customers to easily and
securely manage the lifecycle of their private certificates. Private CA allows developers to be more agile
n-
by providing them APIs to create and deploy private certificates programmatically. Customers also have
the flexibility to create private certificates for applications that require custom certificate lifetimes or
resource names. With Private CA, customers can create and manage private certificates for their
ke
connected resources in one place with a secure, pay as you go, managed private CA service.
Amazon Personalize
-to
Amazon Personalize is a machine learning service that makes it easy for developers to create
individualized recommendations for customers using their applications. Amazon Personalize makes it easy
for developers to build applications capable of delivering a wide array of personalization experiences,
rm
including specific product recommendations, personalized product re-ranking and customized direct
marketing. Amazon Personalize goes beyond rigid static rule- based recommendation systems and trains,
te
ui
Amazon Pinpoint
x7
Amazon Pinpoint helps customers engage with their customers by sending email, SMS, and mobile push
messages. The customers can use Amazon Pinpoint to send targeted messages (such as promotional alerts
and customer retention campaigns), as well as direct messages (such as order confirmations and password
Al
reset messages) to their customers.
Amazon Polly
3f
Amazon Polly is a service that turns text into lifelike speech, allowing customers to create applications
that talk, and build entirely new categories of speech-enabled products. Amazon Polly is a Text-to-
M
Speech service that uses advanced deep learning technologies to synthesize speech that sounds like a
human voice.
m
Amazon Quantum Ledger Database (QLDB)
Amazon Quantum Ledger Database (QLDB) is a ledger database that provides a transparent, immutable
t9
and cryptographically verifiable transaction log owned by a central trusted authority. Amazon QLDB can
be used to track each and every application data change and maintains a complete and verifiable history
J8
of changes over time.
Amazon QuickSight
oj
Amazon QuickSight is a fast, cloud-powered business analytics service that makes it easy to build
visualizations, perform ad-hoc analysis, and quickly get business insights from customers’ data. Using this
cloud-based service customers can connect to their data, perform advanced analysis, and create
PB
visualizations and dashboards that can be accessed from any browser or mobile device.
Amazon Redshift
Amazon Redshift is a data warehouse service to analyze data using a customer’s existing Business
uM
Intelligence (BI) tools. Amazon Redshift also includes Redshift Spectrum, allowing customers to directly
run SQL queries against Exabytes of unstructured data in Amazon S3.
Amazon Rekognition
Fl
The easy-to-use Rekognition API allows customers to automatically identify objects, people, text, scenes,
and activities, as well as detect any inappropriate content. Developers can quickly build a searchable
n-
content library to optimize media workflows, enrich recommendation engines by extracting text in
images, or integrate secondary authentication into existing applications to enhance end-user security.
With a wide variety of use cases, Amazon Rekognition enables the customers to easily add the benefits of
ke
Amazon Relational Database Service (RDS) enables customers to set up, operate, and scale a relational
database in the cloud. Amazon RDS manages backups, software patching, automatic failure detection,
and recovery. It provides cost-efficient and resizable capacity while automating time-consuming
rm
administration tasks such as hardware provisioning, database setup, patching and backups.
te
ui
related outages by uncovering resiliency weaknesses through continuous resiliency assessment and
validation. AWS Resilience Hub can also provide Standard Operating Procedures (SOPs) to help recover
x7
applications on AWS when experiencing unplanned disruptions caused by software, deployment, or
operational problems. The service is designed for cloud-native applications that use highly available, fault
tolerant AWS services as building blocks.
Al
AWS Resource Access Manager
AWS Resource Access Manager helps customers securely share their resources across AWS accounts,
3f
within their organization or organizational units (OUs) in AWS Organizations, and with IAM roles and IAM
users for supported resource types. Customers are able to use AWS Resource Access Manager to share
M
transit gateways, subnets, AWS License Manager license configurations, Amazon Route 53 Resolver rules,
and more resource types.
m
AWS Resource Groups
AWS Resource Groups is a service that helps customers organize AWS resources into logical groupings.
t9
These groups can represent an application, a software component, or an environment. Resource groups
can include more than fifty additional resource types, bringing the overall number of supported resource
J8
types to seventy-seven. Some of these new resource types include Amazon DynamoDB tables, AWS
Lambda functions, AWS CloudTrail trails, and many more. Customers can now create resource groups that
accurately reflect their applications, and take action against those groups, rather than against individual
oj
resources.
AWS RoboMaker
PB
AWS RoboMaker is a service that makes it easy to develop, test, and deploy intelligent robotics
applications at scale. RoboMaker extends the most widely used open-source robotics software
framework, Robot Operating System (ROS), with connectivity to cloud services. This includes AWS
machine learning services, monitoring services, and analytics services that enable a robot to stream data,
uM
Amazon Route 53
Amazon Route 53 provides managed Domain Name System (DNS) web service. Amazon Route 53 connects
n-
user requests to infrastructure running both inside and outside of AWS. Customers can use Amazon Route
53 to configure DNS health checks to route traffic to healthy endpoints or to independently monitor the
ke
health of their application and its endpoints. Amazon Route 53 enables customers to manage traffic
globally through a variety of routing types, including Latency Based Routing, Geo DNS, and Weighted
Round Robin, all of these routing types can be combined with DNS Failover. Amazon Route 53 also offers
Domain Name Registration; customers can purchase and manage domain names such as example.com
-to
and Amazon Route 53 will automatically configure DNS settings for their domains. Amazon Route 53 sends
automated requests over the internet to a resource, such as a web server, to verify that it is reachable,
available, and functional. Customers also can choose to receive notifications when a resource becomes
rm
unavailable and choose to route internet traffic away from unhealthy resources.
te
ui
Amazon SageMaker is a platform that enables developers and data scientists to quickly and easily build,
train, and deploy machine learning models at any scale. Amazon SageMaker removes the barriers that
typically “slow down” developers who want to use machine learning.
x7
Amazon SageMaker removes the complexity that holds back developer success with the process of
building, training, and deploying machine learning models at scale. Amazon SageMaker includes modules
Al
that can be used together or independently to build, train, and deploy a customer’s machine learning
models.
3f
AWS Secrets Manager
AWS Secrets Manager helps customers protect secrets needed to access their applications, services, and
M
IT resources. The service enables customers to easily rotate, manage, and retrieve database credentials,
API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call
m
to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets
Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon
t9
DocumentDB. The service is also extensible to other types of secrets, including API keys and OAuth
tokens. In addition, Secrets Manager allows customers to control access to secrets using fine-grained
permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and
on-premises.
J8
oj
AWS Security Hub
AWS Security Hub gives customers a comprehensive view of their high-priority security alerts and
compliance status across AWS accounts. There are a range of powerful security tools at customers’
PB
disposal, from firewalls and endpoint protection to vulnerability and compliance scanners. With Security
Hub, customers can now have a single place that aggregates, organizes, and prioritizes their security
alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector Classic, and
Amazon Macie, as well as from AWS Partner solutions. Findings are visually summarized on integrated
uM
to migrate thousands of on-premises workloads to AWS. AWS SMS allows customers to automate,
schedule, and track incremental replications of live server volumes, making it easier for customers to
n-
The AWS Serverless Application Repository is a managed repository for serverless applications. It enables
teams, organizations, and individual developers to store and share reusable applications, and easily
assemble and deploy serverless architectures in powerful new ways. Using the Serverless Application
-to
Repository, customers do not need to clone, build, package, or publish source code to AWS before
deploying it. Instead, customers can use pre-built applications from the Serverless Application Repository
in their serverless architectures, helping customers reduce duplicated work, ensure organizational best
rm
practices, and get to market faster. Integration with AWS Identity and Access Management (IAM) provides
resource-level control of each application, enabling customers to publicly share applications with
everyone or privately share them with specific AWS accounts.
te
ui
AWS Service Catalog allows customers to create and manage catalogs of IT services that are approved for
use on AWS. These IT services can include everything from virtual machine images, servers, software, and
x7
databases to complete multi-tier application architectures. AWS Service Catalog allows customers to
centrally manage commonly deployed IT services, and helps customers achieve consistent governance
and meet their compliance requirements, while enabling users to quickly deploy only the approved IT
Al
services they need.
AWS Shield
3f
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations
M
that minimize application downtime and latency, so there is no need to engage AWS Support to benefit
from DDoS protection.
m
Amazon Simple Email Service (SES)
Amazon Simple Email Service (SES) is a cost-effective, flexible and scalable email service that enables
t9
developers to send mail from within any application. Customers can configure Amazon SES to support
several email use cases including transactional, marketing, or mass email communications. Amazon SES'
flexible IP deployment and email authentication options help drive higher deliverability and protect
J8
sender reputation, while sending analytics to measure impact of each email. With Amazon SES, customers
can send email securely, globally and at scale.
oj
Amazon Simple Notification Service (SNS)
Amazon Simple Notification Service (SNS) is a web service to set up, operate, and send notifications. It
PB
provides developers the capability to publish messages from an application and deliver them to
subscribers or other applications. Amazon SNS follows the “publish-subscribe” (pub-sub) messaging
paradigm, with notifications being delivered to clients using a “push” mechanism. Using SNS requires
defining a "Topic", setting policies on access and delivery of the Topic, subscribing consumers and
uM
designating delivery endpoints, and publishing messages to a Topic. Administrators define a Topic as an
access point for publishing messages and allowing customers to subscribe to notifications. Security
policies are applied to Topics to determine who can publish, who can subscribe, and to designate protocols
supported.
Fl
Amazon Simple Queue Service (SQS) is a message queuing service that offers a distributed hosted queue
for storing messages as they travel between computers. By using Amazon SQS, developers can move data
between distributed components of their applications that perform different tasks, without losing
ke
messages or requiring each component to be always available. Amazon SQS allows customers to build an
automated workflow, working in close conjunction with Amazon EC2 and the other AWS infrastructure
web services.
-to
Amazon SQS’ main components consist of a frontend request-router fleet, a backend data-storage fleet,
a metadata cache fleet, and a dynamic workload management fleet. User queues are mapped to one or
rm
more backend clusters. Requests to read, write, or delete messages come into the frontends. The
frontends contact the metadata cache to find out which backend cluster hosts that queue and then
connect to nodes in that cluster to service the request.
te
ui
in the same language used for AWS IAM policies. User permissions for any Amazon SQS resource can be
given either through the Amazon SQS policy system or the AWS IAM policy system, which is authorized
x7
by AWS Identity and Access Management Service. Such policies with a queue are used to specify which
AWS Accounts have access to the queue as well as the type of access and conditions.
Al
Amazon Simple Storage Service (S3)
Amazon Simple Storage Service (S3) provides a web services interface that can be used to store and
retrieve data from anywhere on the web. To provide customers with the flexibility to determine how,
3f
when, and to whom they wish to expose the information they store in AWS, Amazon S3 APIs provide both
bucket and object-level access controls, with defaults that only permit authenticated access by the bucket
M
and/or object creator. Unless a customer grants anonymous access, the first step before a user can access
Amazon S3 is to be authenticated with a request signed using the user’s secret access key.
m
An authenticated user can read an object only if the user has been granted read permissions in an Access
Control List (ACL) at the object level. An authenticated user can list the keys and create or overwrite
t9
objects in a bucket only if the user has been granted read and write permissions in an ACL at the bucket
level. Bucket and object-level ACLs are independent; an object does not inherit ACLs from its bucket.
J8
Permissions to read or modify the bucket or object ACLs are themselves controlled by ACLs that default
to creator-only access. Therefore, the customer maintains full control over who has access to its data.
Customers can grant access to their Amazon S3 data to other AWS users by AWS Account ID or email, or
oj
DevPay Product ID. Customers can also grant access to their Amazon S3 data to all AWS users or to
everyone (enabling anonymous access).
PB
Network devices supporting Amazon S3 are configured to only allow access to specific ports on other
Amazon S3 server systems. External access to data stored in Amazon S3 is logged and the logs are retained
for at least 90 days, including relevant access request information, such as the data accessor IP address,
object, and operation.
uM
sequence driven by a set of dynamic conditions. Amazon SWF enables developers to architect and
implement these tasks, run them in the cloud or on-premise and coordinate their flow. Amazon SWF
n-
manages the execution flow such that tasks are load balanced across the workers, inter-task dependencies
are respected, concurrency is handled appropriately, and child workflows are executed.
ke
Amazon SWF enables applications to be built by orchestrating tasks coordinated by a decider process.
Tasks represent logical units of work and are performed by application components that can take any
form, including executable code, scripts, web service calls, and human actions.
-to
Developers implement workers to perform tasks. They run their workers either on cloud infrastructure,
such as Amazon EC2, or off-cloud. Tasks can be long-running, may fail, may timeout and may complete
rm
with varying throughputs and latencies. Amazon SWF stores tasks for workers, assigns them when workers
are ready, tracks their progress, and keeps their latest state, including details on their completion. To
orchestrate tasks, developers write programs that get the latest state of tasks from Amazon SWF and use
te
ui
Amazon SWF provides auditability by giving customers visibility into the execution of each step in the
x7
application. The Management Console and APIs let customers monitor all running executions of the
application. The customer can zoom in on any execution to see the status of each task and its input and
output data. To facilitate troubleshooting and historical analysis, Amazon SWF retains the history of
Al
executions for any number of days that the customer can specify, up to a maximum of 90 days.
The actual processing of tasks happens on compute resources owned by the end customer. Customers
3f
are responsible for securing these compute resources, for example if a customer uses Amazon EC2 for
workers then they can restrict access to their instances in Amazon EC2 to specific AWS IAM users. In
M
addition, customers are responsible for encrypting sensitive data before it is passed to their workflows
and decrypting it in their workers.
m
Amazon SimpleDB
Amazon SimpleDB is a non-relational data store that allows customers to store and query data items via
t9
web services requests. Amazon SimpleDB then creates and manages multiple geographically distributed
replicas of data automatically to enable high availability and data durability.
J8
Data in Amazon SimpleDB is stored in domains, which are similar to database tables except that functions
cannot be performed across multiple domains. Amazon SimpleDB APIs provide domain-level controls that
oj
only permit authenticated access by the domain creator.
Data stored in Amazon SimpleDB is redundantly stored in multiple physical locations as part of normal
PB
operation of those services. Amazon SimpleDB provides object durability by protecting data across
multiple AZs on the initial write and then actively doing further replication in the event of device
unavailability or detected bit-rot.
uM
and custom applications that support Security Assertion Markup Language (SAML) 2.0. In addition, AWS
IAM Identity Center offers a user portal where users can find all their assigned AWS accounts, business
n-
AWS Signer
ke
AWS Signer is a managed code-signing service to ensure the trust and integrity of customer code.
Customers validate code against a digital signature to confirm that the code is unaltered and from a
trusted publisher. With AWS Signer, customer security administrators have a single place to define their
-to
signing environment, including what AWS Identity and Access Management (IAM) role can sign code and
in what regions. AWS Signer manages the code-signing certificate public and private keys and enables
central management of the code-signing lifecycle.
rm
te
ui
of data into and out of the AWS cloud. Using Snowball addresses common challenges with large-scale data
transfers including high network costs, long transfer times, and security concerns. Transferring data with
x7
Snowball is simple and secure.
Al
AWS Snowball Edge is a 100TB data transfer device with on-board storage and compute capabilities.
Customers can use Snowball Edge to move large amounts of data into and out of AWS, as a temporary
storage tier for large local datasets, or to support local workloads in remote or offline locations. Snowball
3f
Edge connects to customers’ existing applications and infrastructure using standard storage interfaces,
streamlining the data transfer process and minimizing setup and integration. Snowball Edge can cluster
M
together to form a local storage tier and process customers’ data on-premises, helping ensure their
applications continue to run even when they are not able to access the cloud.
m
AWS Snowmobile
AWS Snowmobile is an Exabyte-scale data transfer service used to move extremely large amounts of data
t9
to AWS. Customers can transfer their Exabyte data via a 45-foot long ruggedized shipping container, pulled
by a semi-trailer truck. Snowmobile makes it easy to move massive volumes of data to the cloud, including
J8
video libraries, image repositories, or even a complete data center migration. After a customer’s data is
loaded, Snowmobile is driven back to AWS where their data is imported into Amazon S3 or Amazon
Glacier.
oj
AWS Step Functions
AWS Step Functions is a web service that enables customers to coordinate the components of distributed
PB
applications and microservices using visual workflows. Customers can build applications from individual
components that each perform a discrete function, or task, allowing them to scale and change applications
quickly. Step Functions provides a reliable way to coordinate components and step through the functions
of a customer’s application. Step Functions provides a graphical console to visualize the components of a
uM
customer’s application as a series of steps. It automatically triggers and tracks each step, and retries when
there are errors, so the customer’s application executes in order and as expected, every time. Step
Functions logs the state of each step, so when things do go wrong, customers can diagnose and debug
problems quickly.
Fl
The AWS Storage Gateway service connects customers’ off-cloud software appliances with cloud-based
storage. The service enables organizations to store data in AWS’ highly durable cloud storage services:
Amazon S3 and Amazon Glacier.
ke
AWS Storage Gateway backs up data off-site to Amazon S3 in the form of Amazon EBS snapshots. AWS
Storage Gateway transfers data to AWS and stores this data in either Amazon S3 or Amazon Glacier,
-to
depending on the use case and type of gateway used. There are three types of gateways: Tape, File, and
Volume Gateways. The Tape Gateway allows customers to store more frequently accessed data in Amazon
S3 and less frequently accessed data in Amazon Glacier.
rm
The File Gateway allows customers to copy data to S3 and have those files appear as individual objects in
S3. Volume gateways store data directly in Amazon S3 and allow customers to snapshot their data so that
te
ui
snapshots on multiple devices across multiple facilities, detecting and repairing any lost redundancy. The
Amazon EBS snapshot provides a point-in-time backup that can be restored off-cloud or on a gateway
x7
running in Amazon EC2, or used to instantiate new Amazon EBS volumes. Data is stored within a single
region that customers specify.
Al
AWS Systems Manager
AWS Systems Manager gives customers the visibility and control to their infrastructure on AWS. AWS
Systems Manager provides customers a unified user interface so that customers can view their
3f
operational data from multiple AWS services, and it allows customers to automate operational tasks
across the AWS resources.
M
With AWS Systems manager, customers can group resources, like Amazon EC2 instances, Amazon S3
m
buckets, or Amazon RDS instances, by application, view operational data for monitoring and
troubleshooting, and take action on groups of resources.
t9
Amazon Textract
Amazon Textract automatically extracts text and data from scanned documents. With Textract customers
J8
can quickly automate document workflows, enabling customers to process large volumes of document
pages in a short period of time. Once the information is captured, customers can take action on it within
their business applications to initiate next steps for a loan application or medical claims processing.
oj
Additionally, customers can create search indexes, build automated approval workflows, and better
maintain compliance with document archival rules by flagging data that may require redaction.
PB
Amazon Timestream
Amazon Timestream is a fast, scalable, and serverless time series database service for IoT and operational
applications that makes it easy to store and analyze trillions of events per day up to 1,000 times faster
and at as little as 1/10th the cost of relational databases. Amazon Timestream saves customers time and
uM
cost in managing the lifecycle of time series data by keeping recent data in memory and moving historical
data to a cost optimized storage tier based upon user defined policies. Amazon Timestream's purpose-
built query engine lets customers access and analyze recent and historical data together, without needing
to specify explicitly in the query whether the data resides in the in-memory or cost-optimized tier. Amazon
Fl
Timestream has built-in time series analytics functions, helping customers identify trends and patterns in
data in real-time.
n-
Amazon Transcribe
Amazon Transcribe makes it easy for customers to add speech-to-text capability to their applications.
ke
Audio data is virtually impossible for computers to search and analyze. Therefore, recorded speech needs
to be converted to text before it can be used in applications.
-to
Amazon Transcribe uses a deep learning process called automatic speech recognition (ASR) to convert
speech to text quickly. Amazon Transcribe can be used to transcribe customer service calls, to automate
closed captioning and subtitling, and to generate metadata for media assets to create a fully searchable
rm
archive.
te
ui
AWS Transfer Family
x7
AWS Transfer Family enables the transfer of files directly into and out of Amazon S3. With the support for
Secure File Transfer Protocol (SFTP)—also known as Secure Shell (SSH) File Transfer Protocol, the File
Transfer Protocol over SSL (FTPS) and the File Transfer Protocol (FTP), the AWS Transfer Family helps the
Al
customers seamlessly migrate their file transfer workflows to AWS by integrating with existing
authentication systems and providing DNS routing with Amazon Route 53.
3f
Amazon Translate
Amazon Translate is a neural machine translation service that delivers fast, high-quality, and affordable
M
language translation. Neural machine translation is a form of language translation automation that uses
deep learning models to deliver more accurate and more natural sounding translation than traditional
statistical and rule- based translation algorithms. Amazon Translate allows customers to localize content
m
- such as websites and applications - for international users, and to easily translate large volumes of text
efficiently.
t9
AWS User Notifications (Effective August 15, 2023) J8
AWS User Notifications enables users to centrally configure and view notifications from AWS services,
such as AWS Health events, Amazon CloudWatch alarms, or EC2 Instance state changes, in a consistent,
human-friendly format. Users can view notifications across accounts, regions, and services in a Console
oj
Notifications Center, and configure delivery channels, like email, chat, and push notifications to the AWS
Console mobile app, where they can receive these notifications. Notifications provide URLs to direct users
to resources on the Management Console, to enable further action and remediation.
PB
connect their existing infrastructure to the network isolated Amazon EC2 instances within their Amazon
VPC, including extending their existing management capabilities, such as security services, firewalls and
intrusion detection systems, to include their instances via a Virtual Private Network (VPN) connection. The
VPN service provides end-to-end network isolation by using an IP address range of a customer’s choice,
Fl
and routing all of their network traffic between their Amazon VPC and another network designated by the
customer via an encrypted Internet Protocol security (IPsec) VPN.
n-
Customers can optionally connect their VPC to the Internet by adding an Internet Gateway (IGW) or a NAT
Gateway. An IGW allows bi-directional access to and from the internet for some instances in the VPC
ke
based on the routes a customer defines, which specify which IP address traffic should be routable from
the internet, Security Groups, and Network ACLs (NACLS) which limit which instances can accept or send
this traffic. Customers can also optionally configure a NAT Gateway which allows egress-only traffic
-to
initiated from a VPC instance to reach the internet, but not allow traffic initiated from the internet to
reach VPC instances. This is accomplished by mapping the private IP addresses to a public address on the
way out, and then map the public IP address to the private address on the return trip.
rm
The objective of this architecture is to isolate AWS resources and data in one Amazon VPC from another
Amazon VPC, and to help prevent data transferred from outside the Amazon network except where the
te
ui
Further details are provided below:
x7
• Virtual Private Cloud (VPC): An Amazon VPC is an isolated portion of the AWS cloud within which
customers can deploy Amazon EC2 instances into subnets that segment the VPC’s IP address
Al
range (as designated by the customer) and isolate Amazon EC2 instances in one subnet from
another. Amazon EC2 instances within an Amazon VPC are accessible to customers via Internet
Gateway (IGW), Virtual Gateway (VGW), Transit Gateway (TGW) or VPC Peerings established to
3f
the Amazon VPC.
• IPsec VPN: An IPsec VPN connection connects a customer’s Amazon VPC to another network
M
designated by the customer. IPsec is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. Amazon VPC
m
customers can create an IPsec VPN connection to their Amazon VPC by first establishing an
Internet Key Exchange (IKE) security association between their Amazon VPC VPN gateway and
t9
another network gateway using a pre-shared key as the authenticator. Upon establishment, IKE
negotiates an ephemeral key to secure future IKE messages. An IKE security association cannot
be established unless there is complete agreement among the parameters. Next, using the IKE
J8
ephemeral key, two keys in total are established between the VPN gateway and customer
gateway to form an IPsec security association. Traffic between gateways is encrypted and
decrypted using this security association. IKE automatically rotates the ephemeral keys used to
oj
encrypt traffic within the IPsec security association on a regular basis to ensure confidentiality of
communications.
PB
AWS WAF
AWS WAF is a web application firewall that helps protect customer web applications from common web
exploits that could affect application availability, compromise security, or consume excessive resources.
uM
Customers can use AWS WAF to create custom rules that block common attack patterns, such as SQL
injection or cross-site scripting, and rules that are designed for their specific application. New rules can be
deployed within minutes, letting customers respond quickly to changing traffic patterns. Also, AWS WAF
Fl
includes a full-featured API that customers can use to automate the creation, deployment, and
maintenance of web security rules.
n-
to-one and group messaging, voice and video calling, file sharing, screen sharing, and more. AWS Wickr
encrypts messages, calls, and files with a 256-bit end-to-end encryption protocol. Only the intended
recipients and the customer organization can decrypt these communications, reducing the risk of
-to
adversary-in-the-middle attacks.
Amazon WorkDocs
Amazon WorkDocs is a secure content creation, storage and collaboration service. Users can share files,
rm
provide rich feedback, and access their files on WorkDocs from any device. WorkDocs encrypts data in
transit and at rest, and offers powerful management controls, active directory integration, and near real-
te
ui
third-party applications, or build their own.
x7
Amazon WorkMail
Amazon WorkMail is a managed business email and calendaring service with support for existing desktop
and mobile email clients. It allows access to email, contacts, and calendars using Microsoft Outlook, a
Al
browser, or native iOS and Android email applications. Amazon WorkMail can be integrated with a
customer’s existing corporate directory and the customer controls both the keys that encrypt the data
and the location (AWS Region) under which the data is stored.
3f
Customers can create an organization in Amazon WorkMail, select the Active Directory they wish to
M
integrate with, and choose their encryption key to apply to all customer content. After setup and
validation of their mail domain, users from the Active Directory are selected or added, enabled for Amazon
m
WorkMail, and given an email address identity inside the customer owned mail domain.
Amazon WorkSpaces
t9
Amazon WorkSpaces is a managed desktop computing service in the cloud. Amazon WorkSpaces enables
customers to deliver a high-quality desktop experience to end-users as well as help meet compliance and
J8
security policy requirements. When using Amazon WorkSpaces, an organization’s data is neither sent to
nor stored on end-user devices. The PcoIP protocol used by Amazon WorkSpaces uses an interactive video
stream to provide the desktop experience to the user while the data remains in the AWS cloud or in the
oj
organization’s off-cloud environment.
When Amazon WorkSpaces is integrated with a corporate Active Directory, each WorkSpace joins the
PB
Active Directory domain, and can be managed like any other desktop in the organization. This means that
customers can use Active Directory Group Policies to manage their Amazon WorkSpaces and can specify
configuration options that control the desktop, including those that restrict users’ abilities to use local
storage on their devices. Amazon WorkSpaces also integrates with customers’ existing RADIUS server to
uM
to internal websites and software-as-a-service (SaaS) applications. Customers can access the service from
existing web browsers without infrastructure management, specialized client software, or virtual private
n-
AWS X-Ray
ke
AWS X-Ray helps developers analyze and debug production, distributed applications, such as those built
using a microservices architecture. With X-Ray, customers or developers can understand how their
application and its underlying services are performing to identify and troubleshoot the root cause of
-to
performance issues and errors. X-Ray provides an end-to-end view of requests as they travel through the
customers’ application and shows a map of the application’s underlying components. Customers or
developers can use X-Ray to analyze both applications in development and in production.
rm
VM Import/Export
te
ui
offering allows customers to leverage their existing investments in the virtual machines that customers
have built to meet their IT security, configuration management, and compliance requirements by bringing
x7
those virtual machines into Amazon EC2 as ready-to-use instances. Customers can also export imported
instances back to their off-cloud virtualization infrastructure, allowing them to deploy workloads across
their IT infrastructure.
Al
Principal Service Commitments and System Requirements
3f
Overview
M
Amazon Web Services (AWS) designs its processes and procedures to meet its objectives for the AWS
System. Those objectives are based on the service commitments that AWS makes to user entities
m
(customers), the laws and regulations that govern the provision of the AWS System, and the financial,
operational and compliance requirements that AWS has established for the services.
t9
The AWS services are subject to relevant regulations, as well as state privacy security laws and regulations
in the jurisdictions in which AWS operates. J8
Security, Availability and Confidentiality commitments to customers are documented and communicated
in Service Level Agreements (SLAs) and other customer agreements, as well as in the description of the
oj
service offering provided on the AWS website. Security, Availability and Confidentiality commitments are
standardized and include, but are not limited to, the following:
PB
• Security and confidentiality principles inherent to the fundamental design of the AWS System are
designed to appropriately restrict unauthorized internal and external access to data and customer
data is appropriately segregated from other customers.
uM
• Security and confidentiality principles inherent to the fundamental design of the AWS System are
designed to safeguard data from within and outside of the boundaries of environments which
store a customer’s content to meet the service commitments.
•
Fl
Availability principles inherent to the fundamental design of the AWS System are designed to
replicate critical system components across multiple Availability Zones and authoritative backups
are maintained and monitored to ensure successful replication to meet the service commitments.
n-
• Privacy principles inherent to the fundamental design of the AWS System are designed to protect
the security and confidentiality of AWS customer content to meet the service commitments.
ke
Amazon Web Services establishes operational requirements that support the achievement of security,
availability and confidentiality commitments, relevant laws and regulations, and other system
-to
requirements. Such requirements are communicated in AWS’ system policies and procedures, system
design documentation, and contracts with customers. Information security policies define an
organization-wide approach to how systems and data are protected. These include policies around how
rm
the service is designed and developed, how the system is operated, how the internal business systems
and networks are managed, and how employees are hired and trained. In addition to these policies,
te
ui
As an Infrastructure as a Service (IaaS) System, the AWS System is designed based on a shared
x7
responsibility model where both AWS and the customers are responsible for aspects of security,
availability and confidentiality. Details of the responsibilities of customers can be found on the AWS
website and in the Customer Agreement.
Al
People
3f
Amazon Web Services’ organizational structure provides a framework for planning, executing and
controlling business operations. Executive and senior leadership play important roles in establishing the
M
Company’s tone and core values. The organizational structure assigns roles and responsibilities to provide
for adequate staffing, security, efficiency of operations, and segregation of duties. Management has also
m
established points of authority and appropriate lines of reporting for key personnel.
The Company follows a structured on-boarding process to familiarize new employees with Amazon tools,
t9
processes, systems, security practices, policies and procedures. Employees are provided with the
Company’s Code of Business Conduct and Ethics and additionally complete annual Security & Awareness
J8
training to educate them as to their responsibilities concerning information security. Compliance audits
are performed so that employees understand and follow established policies.
oj
Data
AWS customers retain control and ownership of their own data. Customers are responsible for the
PB
development, operation, maintenance, and use of their content. AWS prevent customers from accessing
physical hosts or instances not assigned to them by filtering through the virtualization software.
When a storage device has reached the end of its useful life, AWS procedures include a decommissioning
uM
process that is designed to prevent unauthorized access to assets. AWS uses techniques detailed in NIST
800-88 (“Guidelines for Media Sanitization”) as part of the decommissioning process. All production media
is securely decommissioned in accordance with industry-standard practices. Production media is not
Fl
Availability
n-
The AWS Resiliency Program encompasses the processes and procedures by which AWS identifies,
ke
responds to and recovers from a major availability event or incident within the AWS services environment.
This program builds upon the traditional approach of addressing contingency management which
incorporates elements of business continuity and disaster recovery plans and expands this to consider
-to
critical elements of proactive risk mitigation strategies such as engineering physically separate Availability
Zones (AZs) and continuous infrastructure capacity planning.
AWS contingency plans and incident response playbooks are maintained and updated to reflect emerging
rm
risks and lessons learned from past incidents. Service team response plans are tested and updated
through the due course of business, and the AWS Resiliency plan is tested, reviewed, and approved by
senior leadership annually.
te
ui
recover service in the event of outage. Critical system components (example: code bases) are backed up
across multiple, isolated locations known as Availability Zones. Each Availability Zone runs on its own
x7
physically distinct, independent infrastructure, and is engineered to be highly reliable. Common points of
failure like generators and cooling equipment are not shared across Availability Zones. Additionally,
Availability Zones are physically separate, and designed such that even extremely uncommon disasters
Al
such as fires, tornados or flooding should only affect a single Availability Zone. AWS replicates critical
system components across multiple Availability Zones and authoritative backups are maintained and
monitored to ensure successful replication.
3f
AWS continuously monitors service usage to project infrastructure needs to support availability
M
commitments and requirements. AWS maintains a capacity planning model to assess infrastructure usage
and demands at least monthly, and usually more frequently (e.g., weekly). In addition, the AWS capacity
m
planning model supports the planning of future demands to acquire and implement additional resources
based upon current resources and forecasted requirements.
t9
Confidentiality
J8
AWS is committed to protecting the security and confidentiality of its customers’ content, defined as
“Your Content” at https://aws.amazon.com/agreement/. AWS’ systems and services are designed to
enable authenticated AWS customers to access and manage their content. AWS notifies customers of
oj
third-party access to a customer’s content on the third-party access page located at
https://aws.amazon.com/compliance/third-party-access. AWS may remove a customer’s content when
compelled to do so by a legal order, or where there is evidence of fraud or abuse as described in the
PB
In the course of AWS system and software design, build, and test of product features, a customer’s
content is not used and remains in the production environment. A customer’s content is not required for
the AWS software development life cycle. When content is required for the development or test of a
Fl
service’s software, AWS service teams have tools to generate mock, random data.
n-
AWS knows customers care about privacy and data security. That is why AWS gives customers ownership
and control over their content by design through tools that allow customers to determine where their
content is stored, secure their content in transit or at rest, and manage access to AWS services and
ke
resources. AWS also implements technical and physical controls designed to prevent unauthorized access
to or disclosure of a customer’s content. As described in the Physical Security and Change Management
areas in Section III of this report, AWS employs a number of controls to safeguard data from within and
-to
outside of the boundaries of environments which store a customer’s content. As a result of these
measures, access to a customer’s content is restricted to authorized parties.
rm
AWS contingency plans and incident response playbooks have defined and tested tools and processes to
detect, mitigate, investigate, and assess security incidents. These plans and playbooks include guidelines
for responding to potential data breaches in accordance with contractual and regulatory requirements.
te
ui
(without actually viewing the data), determining the encryption status of a customer’s content, and
determining improper access to a customer’s content to the extent possible.
x7
During the course of their response, the security engineers document relevant findings in internal tools
used to track the security issue. AWS Security Leadership is regularly apprised of all data security issue
Al
investigations. In the event there are positive indicators that customer content was potentially accessed
by an unintended party, a security engineer engages AWS Security Leadership and the AWS Legal team to
review the findings. AWS Security Leadership and the Legal team review the findings and determine if a
3f
notifiable data breach has occurred pursuant to contractual or regulatory obligations. If confirmed,
affected customers are notified in accordance with the applicable reporting requirement.
M
Vendors and third parties with restricted access, that engage in business with Amazon, are subject to
m
confidentiality commitments as part of their agreements with Amazon. Confidentiality commitments are
included in agreements with vendors and third parties with restricted access and are reviewed by AWS
and the third party at time of contract creation or execution. AWS monitors the performance of third
t9
parties through periodic reviews on a risk-based approach, which evaluate performance against
contractual obligations. J8
AWS communicates its confidentiality commitments to customers on its public website located at
https://aws.amazon.com/compliance/third-party-access/ for contractors and
oj
https://aws.amazon.com/compliance/sub-processors/ for sub-processors. The effective date of the
policy is communicated there and updated periodically. Before AWS authorizes and permits any new
subcontractor to access any customer content, AWS will update this website to inform customers. Vendor
PB
confidentiality commitments are governed by the terms of the contract between AWS and the vendor.
Internally, confidentiality requirements are communicated to employees through training and policies.
Employees are required to attend Amazon Security Awareness (ASA) training, which includes policies and
uM
procedures related to protecting a customer’s content. Confidentiality requirements are included in the
Data Handling and Classification Policy. Policies are reviewed and updated at least annually.
Fl
Privacy
AWS classifies customer data into two categories: customer content and account information. AWS
n-
defines customer content as software (including machine images), data, text, audio, video, or images that
a customer or any end user transfers to AWS for processing, storage, or hosting by AWS services in
ke
connection with that customer's account, and any computational results that a customer or any end user
derives from the foregoing through their use of AWS services. For example, customer content includes
content that a customer or any end user stores in Amazon Simple Storage Service (S3). The terms of the
AWS Customer Agreement (https://aws.amazon.com/agreement/) and AWS Service Terms
-to
Account information is information about a customer that a customer provides to AWS in connection with
rm
the creation or administration of a customer account. For example, account information includes names,
user names, phone numbers, email addresses, and billing information associated with a customer
te
ui
The AWS Privacy Notice is available from the AWS website at https://aws.amazon.com/privacy/. The AWS
x7
Privacy Notice is reviewed by the AWS Legal team, and is updated as required to reflect Amazon’s current
business practices and global regulatory requirements. The Privacy Notice describes how AWS collects
and uses a customer’s personal information in relation to AWS websites, applications, products, services,
Al
events, and experiences. The Privacy Notice does not apply to customer content.
As part of the AWS account creation and activation process, AWS customers are informed of the AWS
3f
Privacy Notice and are required to accept the Customer Agreement, including the terms and conditions
related to the collection, use, retention, disclosure, and disposal of their data. Customers are responsible
M
for determining what content to store within AWS, which may include personal information. Without the
acceptance of the Customer Agreement, customers cannot sign up to use the AWS services.
m
The AWS Customer Agreement informs customers of the AWS data security and privacy commitments
prior to activating an AWS account and is made available to customers to review at any time on the AWS
t9
website.
The customer determines what data is entered into AWS services and has the ability to configure the
J8
appropriate security and privacy settings for the data, including who can access and use the data. Further,
the customer is able to choose not to provide certain data. Additionally, the customer manages
notification or consent requirements, and maintains the accuracy of the data.
oj
Additionally, the AWS Customer Agreement notes how AWS shares, secures, and retains customer
PB
content. AWS also informs customers of updates to the Customer Agreement by making it available on its
website and providing the last updated date. Customers should check the Customer Agreement website
frequently for any changes to the Customer Agreement.
uM
AWS does not store any customer cardholder data obtained from customers. Rather, AWS passes the
customer cardholder data and sends it immediately to the Amazon Payments Platform, the PCI-certified
platform that Amazon uses for all payment processing. This platform returns a unique identifier that AWS
stores and uses for all future processing. The Amazon Payments Platform sits completely outside of the
Fl
AWS boundary and is run by the larger Amazon entity. It is not an AWS service, but it is utilized by the
larger Amazon entity for payment processing. As such, the Amazon payment platform is not in-scope for
n-
this report.
AWS offers customers the ability to update their communication preferences through the AWS console
ke
or via the AWS Email Preference Center. When customers update their communication preferences using
their email, their updated preferences are saved. Customers can unsubscribe from AWS marketing emails
within the AWS console. AWS Customers will still receive important account-related notifications from
-to
AWS, such as monthly billing statements, or if there are significant changes to a service that customers
use.
rm
AWS provides authenticated customers the ability to access, update, and confirm their data. Denial of
access will be communicated using the AWS console. Customers can sign into to their AWS accounts
through the AWS console to view and update their data.
te
ui
we're required to do so to comply with a legally valid and binding order. AWS Legal reviews and maintains
records of all the information requests, which lists information on the types and volume of information
x7
requested. Unless AWS is prohibited from doing so or there is clear indication of illegal conduct in
connection with the use of Amazon products or services, AWS notifies customers before disclosing
customer content so they can seek protection from disclosure. AWS shares customer content only as
Al
described in the AWS Customer Agreement.
AWS may produce non-content and/or content information in response to valid and binding law
3f
enforcement and governmental requests, such as subpoenas, court orders, and search warrants. “Non-
content information” means customer information such as name, address, email address, billing
M
information, date of account creation, and service usage information. Content information” includes the
content that a customer transfers for processing, storage, or hosting in connection with AWS services and
m
any computational results. AWS records customer information requests to maintain a complete, accurate,
and timely record of such requests.
t9
If required, customers are responsible for providing notice to the individuals whose data the customer
collects and uses within AWS. AWS is not responsible for providing such notice to or obtaining consent
J8
from these individuals and is only responsible for communicating its privacy commitments to AWS
customers, which is provided during the account creation and activation process.
oj
AWS has documented an incident response policy and plan which outlines an organized approach for
responding to security breaches and incidents. The AWS Security team is responsible for monitoring
systems, tracking issues, and documenting findings of security-related events. Records are maintained for
PB
security breaches and incidents, which includes status information required for supporting forensic
activities, trend analysis, and evaluation of incident details.
As part of the process, potential breaches of customer content are investigated and escalated to AWS
uM
Security and AWS Legal. Affected customers and regulators are notified of breaches and incidents where
legally required. Customers can subscribe to the AWS Security Bulletins page, which provides information
regarding identified security issues. AWS notifies affected customers and regulators of breaches and
incidents as legally required in accordance with team processes.
Fl
AWS retains and disposes of customer content in accordance with the Customer Agreement and the AWS
n-
Data Classification and Handling Policy. When a customer terminates their account or contract with AWS,
the account is put under isolation; after which within 90 days, customers can restore their accounts and
related content. AWS services hosting customer content are designed to retain customer content until
ke
the contractual obligation to retain a customers’ content ends or a customer-initiated action to remove
or delete the content is taken. When a customer requests data to be deleted, AWS utilizes automated
processes to detect that request and make the content inaccessible. After the deletion is complete,
-to
automated actions are taken on deleted content to render the content unreadable.
AWS performs application security reviews for Third-Party systems that integrate with AWS, to ascertain
rm
security risks are identified and mitigated. A typical security review considers privacy components such as
retention period, use, and collection of data as applicable. The review starts with a system owner initiating
a review request to the dedicated AWS Vendor Security (AVS) team, and submitting detailed information
te
ui
During this process, the AVS team determines the granularity of review required based on the artifact’s
x7
design, threat model, and impact to AWS’ risk profile. They provide security guidance, validate security
assurance material, and meet with external parties to discuss their penetration tests, Software
Development Life Cycle, change management processes, and other operating security controls. They work
Al
with the system owner to identify, prioritize, and remediate security findings. The AVS team collaborates
with AWS Legal as needed to validate that changes are in-line with AWS privacy policies. The AVS team
provides their final approval after they have adequately assessed the risks and worked with the requester
3f
to implement security controls to mitigate identified risks.
M
m
t9
J8
oj
PB
uM
Fl
n-
ke
-to
rm
te