• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Understanding The AWS Shared Security Model

Samantha Hager / 4 min read.
February 28, 2023
Datafloq AI Score
×

Datafloq AI Score: 82

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/wXB6K

Whether entering the cloud for the first time or being a clear veteran of the cloud in every way possible, the concern of security and responsibility remains. What is the average individual in the cloud truly responsible for? How does Amazon Web Services (AWS) tie into this? These are the questions countless individuals worldwide ask themselves when choosing to be a part of the cloud with all of their information and data.

However, to better understand these questions and their respective answers, we must first understand the AWS shared security model and how it greatly impacts the security of the cloud in a positive manner. Through this, we are sure to find the answers to these questions with ease.

What is the AWS Shared Security Model?

According to Cloud Academy, “AWS security best practices begin with the AWS Shared Responsibility Model that dictates which security controls are AWS’s responsibility and which are yours.”

With this said, it can be deduced that the AWS Shared Security Model is an infrastructure that is utilized by the AWS cloud to dictate what they keep secure as well as what you keep secure. Ideally, this is put in place to remove any fault from AWS in the case scenario that one of the aspects you should be protecting are hacked or damaged. It also allows you, the user, to be aware of what you must protect when choosing to be a part of the cloud thus ensuring the safety of the entire experience both for you as well as AWS.

When you first choose to be a part of the cloud, you decide how you want your resources and data to sit in the cloud. You also decided how much of your data and content you want to share with the cloud and how much control you intend to keep likewise. With this said, you inevitably choose how secure you want your data and resources to be and what you plan on protecting yourself.

Because AWS takes security very seriously-as they should-the AWS Shared Security Model provides an outline of what they promise to keep secure and what you should be securing likewise. In short, this model can be broken down into two parts: The security of the cloud, which AWS is responsible for, and the security in the cloud, which you are responsible for. To understand exactly what that means, let’s break that down a bit.

The Security of the Cloud

According to AWS themselves, “AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run AWS Cloud services.”

As such, AWS is responsible for the Global Infrastructure which includes regions, availability zones, and edge locations, as well as the storage, database, networking, and both software and hardware.
Unlike private clouds, AWS is a public cloud which is why it focuses on its own data security and infrastructure and leaves the security in the cloud up to you. Fortunately, this still means that the cloud itself is secure which is a great first step towards true data security in our all-too-often insecure world.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

The Security in the Cloud

When it comes to security in the cloud, this lies in your hands. Fortunately, you are only responsible for everything above the hypervisor level which essentially means that AWS is comfortable doing all the heavy lifting and only leaving you responsible for yourself once inside.

This is why understanding the AWS Shared Security Model is so important. Without a full and comprehensive understanding of what this means, you could unknowingly leave your data and resources vulnerable within the cloud.

Essentially, focusing on all things above the hypervisor level within the cloud consists of your own data, platforms, identity, passwords, applications, encryption, and the OS, network, and firewall configuration. This means that all of the data you choose to be responsible for, all the apps you use and passwords you save, the security parameters you put in place, and your very identity are your responsibility.

Think of AWS as a locker in a gym. It’s convenient, sturdy, and able to hold all of your sensitive information such as your wallet or keys-but it is still your responsibility to lock up these items and ensure they are secure when inside.

This is why AWS relies on you to put the correct security parameters in place inside the cloud. In fact, according to McAfee, “Customers are also responsible for implementing appropriate access control policies using AWS IAM, configuring AWS Security Groups (firewall) to prevent inappropriate access to ports, and enabling AWS CloudTrail. Customers are also responsible for enforcing appropriate data loss prevention policies to ensure compliance with internal and external policies, as well as detecting and remediating threats arising from stolen account credentials or malicious/accidental misuse of AWS.”

With this said, although you don’t have to focus on anything below the hypervisor level or focus on the actual security of the cloud, you are still responsible for yourself and your security and identity alike. This is why getting to know the AWS Shared Security Model like this is the best way to ensure full security within the cloud.

In the end, data security and cloud security remain major concerns for countless internet users worldwide. With hacking becoming more and more prevalent and popular in our modern society, the need for accountability and an outline of shared responsibility is more necessary than ever before. This being said, by being aware of your own responsibility within the cloud, you can successfully secure every aspect of your cloud experience and know that your data and identity are safe within the AWS cloud indefinitely.

Categories: Cloud
Tags: AWS, big data security, Cloud, Data security

About Samantha Hager

Samantha 'Sammy' Hager is a content specialist and investigative journalist with over 13 years in the industry. Her focuses include data, supply chain issues, environmentalism, civil rights, innovation, humanitarianism, marketing, brand leadership, virtual reality, AI, the arts, and innovation. When she's not creating content for countless publications, Hager spends her time with her family, makes art, and prepares for the latest runs and bike races on her schedule.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

How Blockchain Technology Can Enhance Fintech dApp Development

March 23, 2023 By justinalexatechie

IoT protocol and commnication standards

March 22, 2023 By Patrick R

Why Blockchain Is The Missing Piece To IoT Security Puzzle

March 21, 2023 By johnwillium975

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience finance financial future Google+ government Group health information machine learning market mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Velocity Data and Analytics Summit, UAE
  • Webinar: Large Language Models – Balancing Opportunities & Challenges
  • Introduction to Industrial Bioprocess Development
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • Explaining data products lifecycle and their scope in management
  • Microsoft Power BI -The Future of Healthcare’s Most Important Breakthrough
  • The Big Crunch of 2025: Is Your Data Safe from Quantum Computing?
  • From Data to Reality: Leveraging the Metaverse for Business Growth
  • How BlaBlaCar Built a Practical Data Mesh to Support Self-Service Analytics at Scale

Search

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience finance financial future Google+ government Group health information machine learning market mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!