Security - Maintaining Personalized Experiences with Machine Learning

Security

When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. This shared responsibility model reduces your operational burden because AWS operates, manages, and controls the components including the host operating system, the virtualization layer, and the physical security of the facilities in which the services operate. For more information about AWS security, visit AWS Cloud Security and the Amazon Personalize Developer Guide.

AWS recommends rotating your KMS keys on a schedule to at least once in 90 days/as per your enterprise's policies. Also, we recommend enabling CloudTrail to monitor and record account activity across your AWS infrastructure, giving you control over storage, analysis, and remediation actions. This can allow you to track a malicious activity in a security incident.

IAM roles

AWS Identity and Access Management (IAM) roles allow customers to assign granular access policies and permissions to services and users on the AWS Cloud. This AWS solution creates IAM roles that grant the solution’s AWS Lambda functions access to create Regional resources.