Hello and welcome,
In this tutorial, we are going to explore: security in AWS Cloud, why it is important, how to achieve security and where to achieve it from.
In this era of Cloud Computing and Cyberspace, where everything is happening online, security is very important due to a lot of vulnerabilities that Data, Information and Resources are exposed to.
By Security, we mean a way of ensuring that our AWS Cloud resources are safe from potential cloud cybersecurity threats that can lead to loses. This is achievable through combined effort by both AWS Cloud and Customers.
This combination is referred to as Shared Responsibly Model and divided into two: Security In the Cloud and Security of the Cloud.
Why is Security Important?
There are a lot of security threats that are becoming more advanced and evolving. If these threats are not taken care of, they can lead to a lot of losses. Therefore Cloud Security can help in preventing breaches or mitigating damage, improving compliance, and building stronger customer trust. However, you cannot guarantee 100 percent
How To Achieve Security.
To achieve security in AWS Cloud, it involves collective effort by both customer and AWS. In this collective responsibility referred to as Shared Responsibility Model, Customer takes care of security of their data (Security In the Cloud) with help of AWS services, or outsourced services through AWS partners while AWS takes care of Security of the Cloud (AWS Infrastructure and Services, as depicted in this image.
In this model, AWS takes responsibility of protecting the global infrastructure that runs all of the services offered in the AWS Cloud including: hardware, software, networking, and facilities that run AWS services.
AWS customer, takes care of securing data, operating systems, networks, platforms, and other resources they create in the AWS Cloud. This involves protecting the confidentiality, integrity, and availability of data, and for meeting any specific business and compliance requirements for their workloads.
Through this Shared Security Model both Customer and AWS are able to utilize available security resources to enforce security in AWS.
Thank you for reading along, looking forward to see you in the next article where we will explore more about AWS Security.
Top comments (0)