Recommended security controls for implementing AWS CAF security capabilities - AWS Prescriptive Guidance

Recommended security controls for implementing AWS CAF security capabilities

Rishi Singla and Rovan Omar, Amazon Web Services (AWS)

November 2023 (document history)

Security is the top priority at AWS. To help relieve your operational burden, you share responsibility for cloud security and compliance with AWS. AWS is responsible for security of the cloud, which means protecting the infrastructure that runs the services offered in the AWS Cloud. You are responsible for security in the cloud, such as your data and applications. This guide provides security controls that can help you meet your security responsibilities in the AWS Cloud.

The AWS Cloud Adoption Framework (AWS CAF) provides best practices that are designed to improve your cloud readiness. AWS CAF categorizes those best practices into six perspectives: business, people, governance, platform, security, and operations. This guide focuses on the following capabilities in the security perspective:

  • Identity and access management – Manage human and machine identities and their permissions at scale.

  • Threat detection – Configure logging and monitoring to detect and investigate a potential security misconfiguration, threat, or unexpected behavior.

  • Protecting infrastructure – Protect systems and services from unintended or unauthorized access and potential vulnerabilities.

  • Protecting data – Categorize data based on levels of sensitivity. Maintain visibility and control over data and how it is accessed and used in your organization.

  • Incident response – Establish mechanisms to respond to and mitigate the potential impact of security incidents.

Failure to implement preventative, detective, and responsive security controls for these AWS CAF security capabilities can pose a critical risk to your cloud environment, and it can disrupt your business. Implementing the security controls in this guide can help your organization protect its cloud environment.

Note

AWS provides services, tools, and frameworks that can help you operate securely in the AWS Cloud. This guide aligns with and supplements the AWS Well-Architected Framework,  AWS Cloud Adoption Framework (AWS CAF),  the AWS Security Reference Architecture (AWS SRA), and other security recommendations published by AWS. The controls in this guide aren't comprehensive of all cloud security considerations, and this guide isn't intended to replace these frameworks.