Configuration and vulnerability analysis in Amazon GameLift Streams - Amazon GameLift Streams

Configuration and vulnerability analysis in Amazon GameLift Streams

Configuration and IT controls are a shared responsibility between AWS and you, our customer. For more information, see the AWS shared responsibility model. AWS handles basic security tasks like guest operating system (OS) and database patching, firewall configuration, and disaster recovery. These procedures have been reviewed and certified by the appropriate third parties. For more details, see the following resource: Amazon Web Services: Overview of security processes (whitepaper).

The following security best practices also address configuration and vulnerability analysis in Amazon GameLift Streams:

  • Customers are responsible for the management of software deployed to Amazon GameLift Streams stream groups for stream hosting. Specifically:

    • Customer-provided application content and software should be maintained, including updates and security patches. To update, create a new Amazon GameLift Streams application and deploy it to new stream groups.

    • At this time, the operating system and runtime environment for a stream group is updated only when you create a new stream group. To patch, update, and secure the operating system and other applications that are part of the runtime environment, we recommend that you recycle stream groups every two to four weeks, regardless of application updates.

  • Customers should consider regularly updating their games with the latest SDK versions, including the AWS SDK and the Amazon GameLift Streams Web Client SDK.