Security - Predictive Segmentation Using Amazon Pinpoint and Amazon SageMaker

Security

When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. This shared model can reduce your operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. For more information about security on AWS, visit the AWS Security Center.

IAM roles

AWS Identity and Access Management (IAM) roles enable customers to assign granular access policies and permissions to services and users on AWS. Predictive Segmentation Using Amazon Pinpoint and Amazon SageMaker creates several IAM roles, including roles that grant the solution’s AWS Lambda functions access to the other AWS services used in this solution.

Amazon Simple Storage Service (Amazon S3)

All Amazon S3 buckets follow security best practices for Amazon S3 and are encrypted with SSE-S3 managed encryption, configured to block all public access , and enforce encryption of data in transit. Two of the Amazon S3 buckets might contain end-user data including Amazon Pinpoint endpoint exports, results of Amazon Athena queries, and Amazon SageMaker data. A third Amazon S3 bucket is used for Amazon S3 server access logs for the two buckets that might contain the end-user data.

Note

The Amazon S3 buckets are configured with the retention policy set to Retain.