{"id":29862,"date":"2021-12-02T07:11:56","date_gmt":"2021-12-02T07:11:56","guid":{"rendered":"https:\/\/codeandpepper.com\/?p=29862"},"modified":"2022-05-26T10:00:11","modified_gmt":"2022-05-26T10:00:11","slug":"security-aws-amazon-web-services","status":"publish","type":"post","link":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/","title":{"rendered":"AWS Security &#8211; How Secure is Amazon Web Services?"},"content":{"rendered":"\n<p>Security in digital products, not only in FinTech but in applications in general, is a top priority. Software development clients want to make sure that user data and business logic are safe from attacks. Users want to securely invest in applications through loyalty. Security in Amazon Web Services (AWS) is an interesting topic to view the security issue from three perspectives \u2013 the user\u2019s, customer\u2019s and developer\u2019s. Let\u2019s talk about <strong>AWS security issues and how to think about them<\/strong>.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg\" alt=\"Security AWS\" class=\"wp-image-32271\" width=\"864\" height=\"450\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-300x156.jpeg 300w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-768x400.jpeg 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-80x42.jpeg 80w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-119x62.jpeg 119w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-361x188.jpeg 361w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-433x226.jpeg 433w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-192x100.jpeg 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-720x375.jpeg 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS-432x225.jpeg 432w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><\/figure><\/div>\n\n\n\n<p>We have to start with the most important thing \u2013 <strong>yes, AWS is secure<\/strong>. To the highest possible level, since the company started their cloud-based services early on and has an enormous market experience. AWS is as secure as it can be; Amazon provides the necessary expertise and resources to make it happen. AWS supports security with applications like <a href=\"https:\/\/aws.amazon.com\/inspector\" rel=\"nofollow\">Amazon Inspector<\/a> or <a href=\"https:\/\/aws.amazon.com\/waf\" rel=\"nofollow\">Amazon Web Application Firewall<\/a>.&nbsp;<\/p>\n\n\n\n<p>There are, however, things you need to know before you commit to your project and go with AWS-based infrastructure.<\/p>\n\n\n<h4>Table of contents<\/h4>\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#AWS security certification\">AWS security certification<\/a><\/li><li><a href=\"#Top AWS security issues\">Top AWS security issues<\/a><\/li><li><a href=\"#Shared responsibility model\">Shared responsibility model<\/a><\/li><li><a href=\"#How does Code &amp; Pepper deal with Amazon Web Services cloud security?\">How does Code &amp; Pepper deal with Amazon Web Services cloud security?<\/a><\/li><li><a href=\"#How secure is Amazon Web Services?\">How secure is Amazon Web Services?<\/a><\/li><\/ul>\n\n\n\n<section id=\"AWS security certification\" class=\"hidden-block\"><\/section>\n\n<style type=\"text\/css\">\n  #AWS security certification {\n    visibility: hidden !important;\n  }\n<\/style>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-aws-security-certification\">AWS security certification<\/h2>\n\n\n\n<p>For a start, let\u2019s talk about <strong>compliance<\/strong>. With AWS it\u2019s a little bit easier. You need to check if the service you want to use is compatible with the <a href=\"https:\/\/aws.amazon.com\/compliance\/services-in-scope\" rel=\"nofollow\">Health Insurance Portability and Accountability Act<\/a> (HIPAA). And it\u2019s only the beginning. Yes, with AWS you don\u2019t have to think about it. It provides multiple compliance controls but we need to configure the entire application to be compatible with HIPAA or&nbsp; Payment Card Industry Data Security Standard (PCI-DSS).&nbsp;<\/p>\n\n\n\n<p>AWS supports security standards across the board. <strong>AWS security certification includes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>PCI-DSS<\/li><li>HIPAA\/HITECH<\/li><li>FedRAMP<\/li><li>GDPR<\/li><li>FIPS 140-2<\/li><li>NIST 800-171<\/li><\/ul>\n\n\n\n<p>As you can see, the company is ready to help you with nearly every regulatory body there is.&nbsp;<\/p>\n\n\n\n<section id=\"Top AWS security issues\" class=\"hidden-block\"><\/section>\n\n<style type=\"text\/css\">\n  #Top AWS security issues {\n    visibility: hidden !important;\n  }\n<\/style>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-top-aws-security-issues\">Top AWS security issues<\/h2>\n\n\n\n<p>You are <strong>giving up some control in the name of safety<\/strong>. For example, with Lambda, you don\u2019t have complete control and don\u2019t have access to patches for an operating system. This is covered by the giant. Amazon is a company that is responsible for many things and takes care of them so you don\u2019t have to. For example, they provide server infrastructure and destroy hard drives in a special procedure that eliminates the risk of a data leak. They also have strong physical access security, so only authorized persons can be near servers and infrastructure in general.&nbsp;<\/p>\n\n\n\n<p>A fairly recent <a href=\"https:\/\/pages.checkpoint.com\/2020-cloud-security-report.html\" rel=\"nofollow\">2020 Cloud Security Report<\/a> states that unauthorized cloud access is an issue for 42% of managers, while insecure interfaces give headaches to 42% of responders. 40% are worried about misconfiguration of the cloud platform itself, while account hijacking is a problem for 39%. Amazon takes care of all of that. The company secures physical infrastructure and the software development provider takes care of the rest (more on that later).&nbsp;<\/p>\n\n\n\n<p>The next issue comes from the complex nature of the cloud itself. With many different <a href=\"https:\/\/codeandpepper.com\/what-are-microservices\">microservices<\/a> that go with the cloud, control over logins and accessibility rights in general can be hard. Having a <strong>good visibility strategy<\/strong> is key here. You may want to think about host-based intrusion detection to increase transparency and eliminate threats.<\/p>\n\n\n\n<section id=\"Shared responsibility model\" class=\"hidden-block\"><\/section>\n\n<style type=\"text\/css\">\n  #Shared responsibility model {\n    visibility: hidden !important;\n  }\n<\/style>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-shared-responsibility-model\">Shared responsibility model<\/h2>\n\n\n\n<p>However, the biggest part of security in Amazon Web Services is something called a \u201c<strong>shared responsibility model<\/strong>\u201d. That means both security and compliance are shared between AWS and the customer. By reading this, we assume you are interested in <a href=\"https:\/\/www.designrush.com\/agency\/it-services\/managed-service-providers\" target=\"_blank\" rel=\"noreferrer noopener\">managed IT service providers<\/a> or another form of digital product building. If so, then the \u201ccustomer\u201d means us. As a software provider, we are responsible for some portions of the application\u2019s security.<\/p>\n\n\n\n<p>Here is the list of what goes where and who is responsible for what:<\/p>\n\n\n\n<p><strong>AWS security:<\/strong><\/p>\n\n\n\n<p>Software:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Computing<\/li><li>Storage<\/li><li>Database<\/li><li>Networking<\/li><\/ul>\n\n\n\n<p>Hardware \/ AWS global infrastructure:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Regions<\/li><li>Availability zones<\/li><li>Edge locations<\/li><\/ul>\n\n\n\n<p>Let\u2019s focus on these for a second. AWS uses a <a href=\"https:\/\/aws.amazon.com\/about-aws\/global-infrastructure\/regions_az\" rel=\"nofollow\">concept of a Region<\/a>, which is a set of physical locations where the company places data centers. Each group in this concept is called an Availability Zone (AZ). Every AZ has its own power, cooling, and physical security measures. It\u2019s also equipped with an ultra-low-latency network for increased fault-tolerance. AZs are designed to meet high standards of security, data protection and compliance.<\/p>\n\n\n\n<p>Also, AWS supports application\u2019s security. We can use <a href=\"https:\/\/aws.amazon.com\/solutions\/implementations\/multi-region-application-architecture\" rel=\"nofollow\">multi-region application architecture<\/a> and prepare application for an unexpected server room failure in one country or the other. That gives uninterrupted performance.<\/p>\n\n\n\n<p><strong>Customer\u2019s responsibilities:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Customer data<\/li><li>Platform<\/li><li>Applications<\/li><li>Identification and access management<\/li><li>Operating system<\/li><li>Network and firewall configuration<\/li><li>Client-side data encryption and data integrity authentication<\/li><li>Server-side encryption (file system and \/ or data)<\/li><li>Networking traffic protection (encryption, integrity, identity)<\/li><\/ul>\n\n\n\n<section id=\"How does Code &amp; Pepper deal with Amazon Web Services cloud security?\" class=\"hidden-block\"><\/section>\n\n<style type=\"text\/css\">\n  #How does Code &amp; Pepper deal with Amazon Web Services cloud security? {\n    visibility: hidden !important;\n  }\n<\/style>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-code-pepper-deal-with-amazon-web-services-cloud-security\">How does Code &amp; Pepper deal with Amazon Web Services cloud security?<\/h2>\n\n\n\n<p>Let\u2019s start with basics \u2013 we can configure the system in a way that a person has access to the system only through a certain port and with a certain protocol.&nbsp;<\/p>\n\n\n\n<p>We are also responsible for the <strong>operating system<\/strong> (unless it\u2019s serverless) \u2013 installing patches and upgrading to the newest versions. We have to do database encryptions, but don\u2019t have control over encryption keys; these are provided by Amazon. Sometimes we may want to use different and more complicated keys, but this would potentially negatively impact the application\u2019s performance. <strong>We can always present our approach in-depth and with the use of a dedicated document<\/strong>. For now, let\u2019s start with something different \u2013 <strong>the CIA golden rule for security<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>confidentiality (only authorized parties or people can access data)<\/li><li>integrity (data can\u2019t be improperly modified)<\/li><li>availability (authorized parties or people have access to data when they need it)<\/li><\/ul>\n\n\n\n<p>With this simple yet effective triangle, you can be sure we do everything in our power to maintain very high standards of applications\u2019 and <strong>AWS security<\/strong>.<\/p>\n\n\n\n<p>A lot has to do with Amazon Server Side Encryption (SSE) S3 service. It\u2019s responsible for encryption on the AWS side but a software provider can encrypt key on his side as well. Especially when it comes to backups and databases \u2013 if it\u2019s not encrypted, it\u2019s not safe. It\u2019s a matter of tradeoff and what your priority is as our client.<\/p>\n\n\n\n<p>As a software provider, Code &amp; Pepper adopted AWS as the source of serverless solutions. We went for it because AWS has multiple advantages. One is a substantial load of responsibility on the AWS side. We don\u2019t have to secure, for example, an operating system. We can focus on delivering the application itself and install security measures where it\u2019s necessary. For example \u2013 we think about data that goes into Lambda. In general, <strong>serverless eliminates some parts of the work<\/strong> (we don\u2019t have to focus on some parts of the security and operating system) and it eliminates a lot of work. But not all. AWS gives us tools <strong>but doesn\u2019t release us from thinking, predicting and securing<\/strong>.<\/p>\n\n\n\n<p><strong>The most important benefit for you as our client is a combined effort of an experienced cloud computing provider (AWS) and experienced software developer<\/strong>. Together, we can take responsibility for what we do best and complement each other.&nbsp; With serverless architecture, you implement only necessary functionalities. You can do it through microservices and define security measures individually, for each of them.&nbsp;<\/p>\n\n\n\n<p>You can, for example, create architecture so that on the API gateway &#8211; firewall &#8211; Lambda &#8211; DynamoDB route we have a safe means to extract data from our database. Any potential attacks will be blocked earlier, on previous architecture layers.&nbsp;<\/p>\n\n\n\n<p><strong>At Code &amp; Pepper, we believe not only in performance but also in security<\/strong>. That\u2019s why your application can perform and stay safe at the same time. Usually, clients come to us with an overall idea for a secure app. They tell us what compliance regulations we have to meet. Then we check what AWS services are compatible with these regulations and design the product accordingly. For example, the application can\u2019t store the client\u2019s whole credit number; maybe the last four digits. And even if it can store the whole number, it has to be secured with a firewall-protected key and a proper encryption. <strong>Compliance is only a beginning, but it\u2019s a necessary step towards an overall security process<\/strong>. First, we do our job, implement AWS security measures, then you can safely undergo an industry-regulated audit.&nbsp;<\/p>\n\n\n\n<p>No matter the industry you\u2019re in and the nature of your product. Sure, we can and do things like implement secure web dependencies or make sure that headers are safe and HTTPS protocol is there. We can also utilize React Native Async Storage for asynchronous, unencrypted, persistent safety measures. Security in Amazon Web Services and related services can be achieved with multiple tools. There is also the matter of a \u201cman in the middle\u201d attack (MITM) and DNS poofs &#8211; we can make sure that security has no holes when it comes to these types of attacks.<\/p>\n\n\n\n<p>We can configure a firewall or even make non-standard rules. For example, if a certain IP address generates too many requests, an application rejects a connection with this IP. This is obviously DDoS protection. We can go a step further and introduce a rule that a development team doesn\u2019t have access to the whole API schematics. Code &amp; Pepper can also configure the AWS CloudTrail, responsible for tracking user activity within the app.<\/p>\n\n\n\n<section id=\"How secure is Amazon Web Services?\" class=\"hidden-block\"><\/section>\n\n<style type=\"text\/css\">\n  #How secure is Amazon Web Services? {\n    visibility: hidden !important;\n  }\n<\/style>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-secure-is-amazon-web-services\">How secure is Amazon Web Services?<\/h2>\n\n\n\n<p>Very, if you know what you\u2019re doing and are able to combine the power of tailored code with an already established cloud infrastructure. Code &amp; Pepper offers you <a href=\"https:\/\/codeandpepper.com\/services\/cloud-computing-software-development-and-consulting\">cloud computing services<\/a> with performance and security in mind. <strong>Amazon Web Services security breach doesn\u2019t happen directly. <\/strong>Hackers use exploits and system weaknesses in third-party systems, software, and procedures. A misconfigured web application firewall or rootkit enabled in the leaky part of the code can be used to bring your application down.<\/p>\n\n\n\n<p>We do everything possible to avoid these kinds of threats. That\u2019s why, after 15 years, we\u2019re still on the market.<\/p>\n\n\n\n\n\n<section id=\"contact\" class=\"contact-block block common-block \">\n  <div class=\"container\">\n\n\n    \n  <svg class=\"wave\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"280\" height=\"9\" viewBox=\"0 0 280 9\">\n    <path fill=\"currentColor\" fill-rule=\"evenodd\" d=\"M0 3.6c2.88 0 4.18-.668 5.824-1.515C7.724 1.108 9.879 0 13.998 0c4.12 0 6.274 1.108 8.175 2.085 1.644.847 2.943 1.515 5.823 1.515 2.88 0 4.179-.668 5.824-1.515C35.72 1.108 37.874 0 41.995 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.824 1.515 2.88 0 4.18-.668 5.826-1.515C63.719 1.108 65.873 0 69.993 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.18-.668 5.825-1.515C91.715 1.108 93.87 0 97.99 0c4.12 0 6.273 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.178-.668 5.824-1.515 1.9-.977 4.054-2.085 8.173-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.055-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.179-.668 5.824-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.274 1.108 8.175 2.085 1.646.847 2.946 1.515 5.826 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.881 0 4.18-.668 5.827-1.515 1.9-.977 4.056-2.085 8.176-2.085 4.121 0 6.276 1.108 8.177 2.085 1.646.847 2.946 1.515 5.827 1.515s4.181-.668 5.828-1.515C259.718 1.108 261.873 0 265.995 0c4.121 0 6.275 1.108 8.177 2.084 1.645.848 2.946 1.516 5.828 1.516V9h-.007l-5.252-.793c-1.129-.382-2.056-.848-2.919-1.291-1.646-.847-2.946-1.516-5.827-1.516-2.882 0-4.183.669-5.829 1.516-1.9.977-4.056 2.084-8.177 2.084-4.12 0-6.275-1.107-8.176-2.084-1.647-.847-2.947-1.516-5.828-1.516-2.88 0-4.18.669-5.827 1.516-1.9.977-4.055 2.084-8.176 2.084-4.12 0-6.273-1.107-8.175-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.826 1.516c-1.9.977-4.055 2.084-8.175 2.084-4.12 0-6.275-1.107-8.176-2.084-1.644-.847-2.945-1.516-5.825-1.516-2.88 0-4.18.669-5.825 1.516-1.9.977-4.054 2.084-8.174 2.084-4.12 0-6.274-1.107-8.176-2.084-1.644-.847-2.943-1.516-5.823-1.516-2.88 0-4.18.669-5.826 1.516-1.9.977-4.054 2.084-8.175 2.084-4.12 0-6.274-1.107-8.174-2.084-1.646-.847-2.946-1.516-5.825-1.516s-4.179.669-5.824 1.516c-1.9.977-4.053 2.084-8.173 2.084s-6.273-1.107-8.173-2.084c-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.179.669-5.824 1.516C90.265 7.893 88.11 9 83.99 9c-4.12 0-6.273-1.107-8.173-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.825 1.516C62.268 7.893 60.113 9 55.993 9c-4.12 0-6.274-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.18.669-5.825 1.516C34.27 7.893 32.116 9 27.996 9c-4.12 0-6.273-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516s-4.179.669-5.824 1.516C7.311 7.359 1.127 8.618 0 9\"\/>\n<\/svg>\n\n<h2 class=\"block-title section-title\">\n  Let&#8217;s talk about your project!<\/h2>\n\n\n  <div class=\"block-description typography-body\">\n    <p>Tell us more about what you want to do. We will secure your application and test it from top to bottom.<\/p>\n  <\/div>\n\n    \n          <div class=\"contact-block-person\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"90\" height=\"90\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web.jpg\" class=\"contact-block-person-image\" alt=\"Jacek Kosciesza portrait\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web.jpg 1200w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-300x300.jpg 300w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-1024x1024.jpg 1024w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-150x150.jpg 150w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-768x768.jpg 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-209x209.jpg 209w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-140x140.jpg 140w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-250x250.jpg 250w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-100x100.jpg 100w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-700x700.jpg 700w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-864x864.jpg 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/jacek-kosciesza-web-432x432.jpg 432w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/>        <div class=\"contact-block-person-text\">\n          <div class=\"typography-title-m\">\n            Jacek          <\/div>\n          <div class=\"typography-body-medium\">\n            CTO          <\/div>\n        <\/div>\n      <\/div>\n    \n\n    <form class=\"contact-form\" method=\"POST\" action=\"https:\/\/codeandpepper.com\/wp-admin\/admin-ajax.php\">\n            <amp-recaptcha-input layout=\"nodisplay\" name=\"recaptcha_token\" data-sitekey=\"6LeEo8cqAAAAABpahzrYQeEsO-xoutAjoIkrKpTB\" data-action=\"contact_block\"><\/amp-recaptcha-input>\n            <input type=\"hidden\" name=\"action\" value=\"contact_block_submit\" \/>\n      <input type=\"hidden\" name=\"block\" value=\"smallContactForm\" \/>\n      <input id=\"contact-email\" type=\"email\" name=\"email\" placeholder=\"Email\" class=\"gtm_form_input\" required>\n      <label for=\"contact-email\" class=\"contact-block-hidden-label\">Email<\/label>\n      <input id=\"contact-name\" type=\"text\" name=\"name\" placeholder=\"Full name\" class=\"gtm_form_input\" required>\n      <label for=\"contact-name\" class=\"contact-block-hidden-label\">\n        Full name      <\/label>\n\n      <input type=\"submit\" name=\"submit\" value=\"GET A QUOTE\" class=\"gtm_form_submit btn-big\">\n\n      <div submitting>\n      <\/div>\n      <div id=\"TYPSmallForm\" class=\"submit-msg submit-success\" submit-success>\n        <template type=\"amp-mustache\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"26\" viewBox=\"0 0 26 26\">\n    <g fill=\"none\" fill-rule=\"evenodd\">\n        <g stroke=\"#FFF\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" transform=\"translate(1 1)\">\n            <path d=\"M17 8.5l-7.5 7L7 13\"\/>\n            <circle cx=\"12\" cy=\"12\" r=\"11.5\"\/>\n        <\/g>\n        <path d=\"M1 1h24v24H1z\"\/>\n    <\/g>\n<\/svg>\n          Your message has been sent. We will get back to you as soon as possible.\n        <\/template>\n      <\/div>\n      <div id=\"ErrorSmallForm\" class=\"submit-msg submit-error\" submit-error>\n        <template type=\"amp-mustache\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"25\" viewBox=\"0 0 25 25\">\n    <g fill=\"none\" fill-rule=\"evenodd\">\n        <g stroke=\"currentColor\" stroke-linejoin=\"round\">\n            <path stroke-linecap=\"round\" stroke-width=\"2\" d=\"M23.498 12.31c.105 6.075-4.923 11.086-10.998 11.192-6.074.104-10.893-4.734-10.998-10.81C1.396 6.619 6.426 1.606 12.5 1.502c6.074-.106 10.893 4.734 10.998 10.808zM12.5 14V7\"\/>\n            <path fill=\"currentColor\" stroke-width=\"1.5\" d=\"M13 17.5a.5.5 0 0 1-1 0 .5.5 0 0 1 1 0z\"\/>\n        <\/g>\n        <path d=\"M1 0h24v24H1z\"\/>\n    <\/g>\n<\/svg>\n          Oops! Something went wrong. Please try again later.\n        <\/template>\n      <\/div>\n    <\/form>\n\n\n  <\/div>\n<\/section>\n<style type=\"text\/css\">\n  #contact {\n    background: #009fe3;\n    color: #FFFFFF;\n  }\n\n  #contactsvg {\n    color: #ffffff;\n  }\n<\/style>\n\n<section id=\"related-posts-block_628f4f27e0f4e\" class=\"related-posts-block block common-block \">\n  <div class=\"container\">\n\n\n    \n  <svg class=\"wave\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"280\" height=\"9\" viewBox=\"0 0 280 9\">\n    <path fill=\"currentColor\" fill-rule=\"evenodd\" d=\"M0 3.6c2.88 0 4.18-.668 5.824-1.515C7.724 1.108 9.879 0 13.998 0c4.12 0 6.274 1.108 8.175 2.085 1.644.847 2.943 1.515 5.823 1.515 2.88 0 4.179-.668 5.824-1.515C35.72 1.108 37.874 0 41.995 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.824 1.515 2.88 0 4.18-.668 5.826-1.515C63.719 1.108 65.873 0 69.993 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.18-.668 5.825-1.515C91.715 1.108 93.87 0 97.99 0c4.12 0 6.273 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.178-.668 5.824-1.515 1.9-.977 4.054-2.085 8.173-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.055-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.179-.668 5.824-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.274 1.108 8.175 2.085 1.646.847 2.946 1.515 5.826 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.881 0 4.18-.668 5.827-1.515 1.9-.977 4.056-2.085 8.176-2.085 4.121 0 6.276 1.108 8.177 2.085 1.646.847 2.946 1.515 5.827 1.515s4.181-.668 5.828-1.515C259.718 1.108 261.873 0 265.995 0c4.121 0 6.275 1.108 8.177 2.084 1.645.848 2.946 1.516 5.828 1.516V9h-.007l-5.252-.793c-1.129-.382-2.056-.848-2.919-1.291-1.646-.847-2.946-1.516-5.827-1.516-2.882 0-4.183.669-5.829 1.516-1.9.977-4.056 2.084-8.177 2.084-4.12 0-6.275-1.107-8.176-2.084-1.647-.847-2.947-1.516-5.828-1.516-2.88 0-4.18.669-5.827 1.516-1.9.977-4.055 2.084-8.176 2.084-4.12 0-6.273-1.107-8.175-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.826 1.516c-1.9.977-4.055 2.084-8.175 2.084-4.12 0-6.275-1.107-8.176-2.084-1.644-.847-2.945-1.516-5.825-1.516-2.88 0-4.18.669-5.825 1.516-1.9.977-4.054 2.084-8.174 2.084-4.12 0-6.274-1.107-8.176-2.084-1.644-.847-2.943-1.516-5.823-1.516-2.88 0-4.18.669-5.826 1.516-1.9.977-4.054 2.084-8.175 2.084-4.12 0-6.274-1.107-8.174-2.084-1.646-.847-2.946-1.516-5.825-1.516s-4.179.669-5.824 1.516c-1.9.977-4.053 2.084-8.173 2.084s-6.273-1.107-8.173-2.084c-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.179.669-5.824 1.516C90.265 7.893 88.11 9 83.99 9c-4.12 0-6.273-1.107-8.173-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.825 1.516C62.268 7.893 60.113 9 55.993 9c-4.12 0-6.274-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.18.669-5.825 1.516C34.27 7.893 32.116 9 27.996 9c-4.12 0-6.273-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516s-4.179.669-5.824 1.516C7.311 7.359 1.127 8.618 0 9\"\/>\n<\/svg>\n\n<h2 class=\"block-title section-title\">\n  Related posts<\/h2>\n\n\n\n    <div>\n      <div class=\"related-posts\">\n                  <div class=\"related-post\">\n            <h3 class=\"related-post-title typography-title-m\">\n              <a href=\"https:\/\/codeandpepper.com\/analytics-on-amazon-aws-big-data\/\" title=\"Data Analytics on AWS\">\n                Data Analytics on AWS              <\/a>\n            <\/h3>\n                          <a class=\"related-post-thumbnail\" aria-label=\"Data Analytics on AWS\" href=\"https:\/\/codeandpepper.com\/analytics-on-amazon-aws-big-data\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"189\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data.jpeg\" class=\"attachment-blog-thumbnail size-blog-thumbnail wp-post-image\" alt=\"Analytics on Amazon - AWS big data\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data.jpeg 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-768x400.jpeg 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-80x42.jpeg 80w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-119x62.jpeg 119w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-433x226.jpeg 433w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-192x100.jpeg 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-720x375.jpeg 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS_Big_Data-432x225.jpeg 432w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>              <\/a>\n                        <p class=\"related-post-description typography-body-smaller\">\n              Analytics on Amazon is key to success when going with AWS cloud. Mine these practical tips to make company&#8217;s growth easier.            <\/p>\n            <a class=\"plus-link\" href=\"https:\/\/codeandpepper.com\/analytics-on-amazon-aws-big-data\/\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"17\" height=\"17\" viewBox=\"0 0 17 17\">\n    <path d=\"M7 0h3v17H7z\"\/>\n    <path d=\"M17 7v3H0V7z\"\/>\n<\/svg>\n              <span>Full Article<\/span>\n            <\/a>\n          <\/div>\n                  <div class=\"related-post\">\n            <h3 class=\"related-post-title typography-title-m\">\n              <a href=\"https:\/\/codeandpepper.com\/infrastructure-as-code-deploying-web-applications-on-aws-cloudformation\/\" title=\"Infrastructure as Code: AWS and CloudFormation\">\n                Infrastructure as Code: AWS and CloudFormation              <\/a>\n            <\/h3>\n                          <a class=\"related-post-thumbnail\" aria-label=\"Infrastructure as Code: AWS and CloudFormation\" href=\"https:\/\/codeandpepper.com\/infrastructure-as-code-deploying-web-applications-on-aws-cloudformation\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"189\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code.png\" class=\"attachment-blog-thumbnail size-blog-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code.png 1200w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-768x400.png 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-192x100.png 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-720x375.png 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-864x450.png 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-432x225.png 432w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>              <\/a>\n                        <p class=\"related-post-description typography-body-smaller\">\n              From this short guide, you will learn how to use CloudFormation and Infrastructure as Code to deploy your web application on AWS.            <\/p>\n            <a class=\"plus-link\" href=\"https:\/\/codeandpepper.com\/infrastructure-as-code-deploying-web-applications-on-aws-cloudformation\/\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"17\" height=\"17\" viewBox=\"0 0 17 17\">\n    <path d=\"M7 0h3v17H7z\"\/>\n    <path d=\"M17 7v3H0V7z\"\/>\n<\/svg>\n              <span>Full Article<\/span>\n            <\/a>\n          <\/div>\n                  <div class=\"related-post\">\n            <h3 class=\"related-post-title typography-title-m\">\n              <a href=\"https:\/\/codeandpepper.com\/fight-against-anti-money-laundering-aml\/\" title=\"AI Helps Fight Money Laundering\">\n                AI Helps Fight Money Laundering              <\/a>\n            <\/h3>\n                          <a class=\"related-post-thumbnail\" aria-label=\"AI Helps Fight Money Laundering\" href=\"https:\/\/codeandpepper.com\/fight-against-anti-money-laundering-aml\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"189\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/03\/AI-vs-Financial-Crime-Fight-AML.jpg\" class=\"attachment-blog-thumbnail size-blog-thumbnail wp-post-image\" alt=\"Fighting financial crime with AI\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/03\/AI-vs-Financial-Crime-Fight-AML.jpg 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/03\/AI-vs-Financial-Crime-Fight-AML-768x400.jpg 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/03\/AI-vs-Financial-Crime-Fight-AML-192x100.jpg 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/03\/AI-vs-Financial-Crime-Fight-AML-720x375.jpg 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/03\/AI-vs-Financial-Crime-Fight-AML-432x225.jpg 432w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>              <\/a>\n                        <p class=\"related-post-description typography-body-smaller\">\n              Artificial intelligence and anti-money laundering technologies help with bad practices and security threats. What&#8217;s their secrets?            <\/p>\n            <a class=\"plus-link\" href=\"https:\/\/codeandpepper.com\/fight-against-anti-money-laundering-aml\/\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"17\" height=\"17\" viewBox=\"0 0 17 17\">\n    <path d=\"M7 0h3v17H7z\"\/>\n    <path d=\"M17 7v3H0V7z\"\/>\n<\/svg>\n              <span>Full Article<\/span>\n            <\/a>\n          <\/div>\n              <\/div>\n    <\/div>\n\n\n  <\/div>\n<\/section>\n\n<style type=\"text\/css\">\n  #related-posts-block_628f4f27e0f4e {\n    background: ;\n    color: ;\n  }\n\n  #related-posts-block_628f4f27e0f4e .block-title {\n    color: ;\n  }\n<\/style>","protected":false},"excerpt":{"rendered":"<p>Security in digital products, not only in FinTech but in applications in general, is a top priority. Software development clients want to make sure that user data and business logic are safe from attacks. Users want to securely invest in applications through loyalty. Security in Amazon Web Services (AWS) is an interesting topic to view<a class=\"moretag\" href=\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\"> Read the full article&#8230;<\/a><\/p>\n","protected":false},"author":20413,"featured_media":32271,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1647],"tags":[2074,1158,173],"class_list":["post-29862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-development","tag-microservices","tag-project-management-process","tag-software-development-process"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AWS Security - How Secure is Amazon Web Services? | Code &amp; Pepper<\/title>\n<meta name=\"description\" content=\"The issue of security in Amazon Web Services is crucial in many industries. We make it our top priority. Read and learn how to implement it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AWS Security - How Secure is Amazon Web Services? | Code &amp; Pepper\" \/>\n<meta property=\"og:description\" content=\"The issue of security in Amazon Web Services is crucial in many industries. We make it our top priority. Read and learn how to implement it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Code &amp; Pepper\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codeandpepper\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-02T07:11:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-26T10:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"864\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jaros\u0142aw \u015aci\u015blak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@codeandpepper\" \/>\n<meta name=\"twitter:site\" content=\"@codeandpepper\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jaros\u0142aw \u015aci\u015blak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\"},\"author\":{\"name\":\"Jaros\u0142aw \u015aci\u015blak\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885\"},\"headline\":\"AWS Security &#8211; How Secure is Amazon Web Services?\",\"datePublished\":\"2021-12-02T07:11:56+00:00\",\"dateModified\":\"2022-05-26T10:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\"},\"wordCount\":1707,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/codeandpepper.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg\",\"keywords\":[\"Microservices\",\"Project management process\",\"Software development process\"],\"articleSection\":[\"Software Development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\",\"url\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\",\"name\":\"AWS Security - How Secure is Amazon Web Services? | Code &amp; Pepper\",\"isPartOf\":{\"@id\":\"https:\/\/codeandpepper.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg\",\"datePublished\":\"2021-12-02T07:11:56+00:00\",\"dateModified\":\"2022-05-26T10:00:11+00:00\",\"description\":\"The issue of security in Amazon Web Services is crucial in many industries. We make it our top priority. Read and learn how to implement it.\",\"breadcrumb\":{\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage\",\"url\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg\",\"contentUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg\",\"width\":864,\"height\":450,\"caption\":\"Security in Amazon Web Services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/codeandpepper.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS Security &#8211; How Secure is Amazon Web Services?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/codeandpepper.com\/#website\",\"url\":\"https:\/\/codeandpepper.com\/\",\"name\":\"Code & Pepper\",\"description\":\"FinTech Developers\",\"publisher\":{\"@id\":\"https:\/\/codeandpepper.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/codeandpepper.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/codeandpepper.com\/#organization\",\"name\":\"Code & Pepper\",\"url\":\"https:\/\/codeandpepper.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png\",\"contentUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png\",\"width\":319,\"height\":144,\"caption\":\"Code & Pepper\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codeandpepper\/\",\"https:\/\/x.com\/codeandpepper\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885\",\"name\":\"Jaros\u0142aw \u015aci\u015blak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g\",\"caption\":\"Jaros\u0142aw \u015aci\u015blak\"},\"description\":\"Branding, marketing, business scaling, content &amp; company culture specialist. Over 20 years of experience in marketing, strategy, and writing. Learn more by visiting: scislak.com\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jaroslawscislak\"],\"url\":\"https:\/\/codeandpepper.com\/author\/jarek-scislak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AWS Security - How Secure is Amazon Web Services? | Code &amp; Pepper","description":"The issue of security in Amazon Web Services is crucial in many industries. We make it our top priority. Read and learn how to implement it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/","og_locale":"en_US","og_type":"article","og_title":"AWS Security - How Secure is Amazon Web Services? | Code &amp; Pepper","og_description":"The issue of security in Amazon Web Services is crucial in many industries. We make it our top priority. Read and learn how to implement it.","og_url":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/","og_site_name":"Code &amp; Pepper","article_publisher":"https:\/\/www.facebook.com\/codeandpepper\/","article_published_time":"2021-12-02T07:11:56+00:00","article_modified_time":"2022-05-26T10:00:11+00:00","og_image":[{"width":864,"height":450,"url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg","type":"image\/jpeg"}],"author":"Jaros\u0142aw \u015aci\u015blak","twitter_card":"summary_large_image","twitter_creator":"@codeandpepper","twitter_site":"@codeandpepper","twitter_misc":{"Written by":"Jaros\u0142aw \u015aci\u015blak","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#article","isPartOf":{"@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/"},"author":{"name":"Jaros\u0142aw \u015aci\u015blak","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885"},"headline":"AWS Security &#8211; How Secure is Amazon Web Services?","datePublished":"2021-12-02T07:11:56+00:00","dateModified":"2022-05-26T10:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/"},"wordCount":1707,"commentCount":0,"publisher":{"@id":"https:\/\/codeandpepper.com\/#organization"},"image":{"@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage"},"thumbnailUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg","keywords":["Microservices","Project management process","Software development process"],"articleSection":["Software Development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/","url":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/","name":"AWS Security - How Secure is Amazon Web Services? | Code &amp; Pepper","isPartOf":{"@id":"https:\/\/codeandpepper.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage"},"image":{"@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage"},"thumbnailUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg","datePublished":"2021-12-02T07:11:56+00:00","dateModified":"2022-05-26T10:00:11+00:00","description":"The issue of security in Amazon Web Services is crucial in many industries. We make it our top priority. Read and learn how to implement it.","breadcrumb":{"@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#primaryimage","url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg","contentUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/11\/AWS.jpeg","width":864,"height":450,"caption":"Security in Amazon Web Services"},{"@type":"BreadcrumbList","@id":"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/codeandpepper.com\/"},{"@type":"ListItem","position":2,"name":"AWS Security &#8211; How Secure is Amazon Web Services?"}]},{"@type":"WebSite","@id":"https:\/\/codeandpepper.com\/#website","url":"https:\/\/codeandpepper.com\/","name":"Code & Pepper","description":"FinTech Developers","publisher":{"@id":"https:\/\/codeandpepper.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/codeandpepper.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/codeandpepper.com\/#organization","name":"Code & Pepper","url":"https:\/\/codeandpepper.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/","url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png","contentUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png","width":319,"height":144,"caption":"Code & Pepper"},"image":{"@id":"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codeandpepper\/","https:\/\/x.com\/codeandpepper"]},{"@type":"Person","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885","name":"Jaros\u0142aw \u015aci\u015blak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g","caption":"Jaros\u0142aw \u015aci\u015blak"},"description":"Branding, marketing, business scaling, content &amp; company culture specialist. Over 20 years of experience in marketing, strategy, and writing. Learn more by visiting: scislak.com","sameAs":["https:\/\/www.linkedin.com\/in\/jaroslawscislak"],"url":"https:\/\/codeandpepper.com\/author\/jarek-scislak\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/29862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/users\/20413"}],"replies":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/comments?post=29862"}],"version-history":[{"count":12,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/29862\/revisions"}],"predecessor-version":[{"id":36652,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/29862\/revisions\/36652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/media\/32271"}],"wp:attachment":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/media?parent=29862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/categories?post=29862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/tags?post=29862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}