USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

AWS Security Framework: Shared Responsibility Model, Key Security Concepts

Lesson 10/18 | Study Time: 20 Min

Security in cloud computing is a collaborative effort between the cloud service provider and the customer, which is clearly defined by the AWS Shared Responsibility Model.

This model helps businesses understand and manage the division of security duties, ensuring that both AWS and customers play crucial roles in maintaining a secure environment.

The model also grants businesses flexibility and control, allowing them to tailor security practices to their unique needs without deep technical complexity.

The AWS Shared Responsibility Model

The shared responsibility model divides security tasks into two main categories:


1. Security of the Cloud (AWS’s responsibility): AWS is responsible for securing the infrastructure that supports the cloud services.This includes the physical data centres, hardware, software, networking, and facilities. Essentially, AWS handles the underlying foundation—maintaining and protecting the global infrastructure where services are run.


2. Security in the Cloud (Customer’s responsibility): Customers are responsible for securing whatever they deploy and manage within the cloud. This includes managing guest operating systems, software updates and patches, configuring firewalls and network security groups, managing access controls, encrypting data, and protecting applications.

The extent of customer responsibility varies based on the services used; for example, Infrastructure as a Service (IaaS) requires more customer control than abstracted services like storage.

Key Security Concepts 

Below are the primary concepts that form the foundation of AWS’s security and governance model.


1. Data Protection: Customers retain control over their data security by encrypting data at rest and in transit using AWS tools and configuring proper access permissions.

2. Access Management: AWS provides Identity and Access Management (IAM) tools that customers use to regulate who can access AWS services and resources, ensuring only authorised users can perform actions.

3. Network Security: Customers configure network controls such as security groups and virtual private clouds (VPCs) to isolate and monitor traffic within their cloud environment.

4. Compliance and Certifications: AWS maintains compliance with global standards and provides documentation to help customers meet regulatory requirements, but customers must ensure their usage complies with applicable laws.

5. Shared Controls: In many cases, AWS manages physical and environmental controls, while customers handle application-level security controls, creating a shared security posture.

Importance of Understanding the Shared Responsibility Model

Knowing which security responsibilities AWS manages versus what customers must secure helps in designing robust security strategies.

Proper awareness ensures businesses do not overlook critical security areas or mistakenly assume AWS covers all security layers. This clarity reduces operational risks and aligns security efforts efficiently between AWS and the customer.

Nate Parker

Nate Parker

Product Designer
Profile

Class Sessions

1- Cloud Computing Basics: Definition, Essential Characteristics, and Deployment Models (Public, Private, Hybrid) 2- AWS Cloud Overview: What is AWS, History, Scale, and Global Infrastructure 3- Cloud Benefits for Business: Agility, Scalability, Cost Efficiency, Innovation Enablement 4- Strategic Advantages: How Cloud Computing Drives Business Transformation and Competitive Advantage 5- Business Outcomes Enabled by AWS: Speed to Market, Improved Customer Experience, Operational Resilience 6- Financial Impact: Cost Avoidance vs. Cost Optimization, CapEx vs. OpEx Models 7- Compute and Storage Essentials: Introduction to Amazon EC2, S3, and Databases in a Business Context 8- Networking and Content Delivery: CloudFront, VPC Basics, and Relevance to Business Continuity 9- Analytics and AI Services Overview: How Analytics and AI Services Drive Data-Driven Decisions 10- AWS Security Framework: Shared Responsibility Model, Key Security Concepts 11- Compliance Programs: Relevant Compliance Certifications and Their Importance for Business Trust 12- Risk Management and Governance: Business Controls, Auditability, and Compliance Monitoring 13- Migration Approaches: Rehost, Replatform, Refactor—Business Considerations for Each 14- Cloud Adoption Framework: Organizational Readiness, Governance, and Change Management 15- Challenges and Risks: Common Business Risks and Mitigation Strategies in Cloud Adoption 16- AWS Pricing Models: Pay-as-You-Go, Reserved Instances, Savings Plans Explained Simply 17- Cost Management Tools: Billing Dashboards, Budgeting, and Cost Optimization Strategies for Business Leaders 18- Building a Business Case: TCO Analysis, ROI Estimation, and Stakeholder Alignment