This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
As AWS customers continue moving workloads to the edge to gain the benefits of the edge’s low latency and take advantage of the resiliency and scalability of the cloud, security remains a top priority. By extending cloud services to the edge, AWS provides you with the tools to operate safely utilizing a defense in depth strategy.
The strategy focuses on implementing the best practices outlined in the design principles of the AWS Well-Architected Framework Security Pillar’s design principles to secure edge devices and applications, and to create an integrated, layered security perimeter at AWS edge locations to secure content delivery, protect the application layer, and mitigate DDoS attacks.
Regardless of your environment — in the cloud, at the edge, or hybrid — basic security principles remain the same. Applying the best practices found in the design principles of the AWS Well-Architected Framework Security Pillar helps set a firm security foundation for your network.