Skip to main content

🔒 Pillar 2: Security

Security is the second pillar of the AWS Well-Architected Framework.

It focuses on protecting information, systems, and assets while delivering business value through risk assessment and mitigation strategies.

Security is not just a requirement, it’s a cost-saving strategy that minimizes the risk of data breaches, downtime, and compliance violations.

Design Principles of Security

  • Establish a Strong Identity Foundation: Use AWS Identity and Access Management (IAM) and AWS Organizations to centrally manage user access and apply least privilege permissions.

  • Enable Traceability: Continuously monitor and log all actions using AWS CloudTrail, AWS Config, and Amazon CloudWatch for visibility and auditing.

  • Apply Security at All Layers: Protect every layer from the edge network (CloudFront, Shield) to VPC, subnets, instances, OS, and applications.

  • Automate Security Best Practices: Use infrastructure automation and policies to enforce consistent security across environments.

  • Protect Data in Transit and at Rest: Encrypt all data using SSL/TLS, AWS KMS, and service-level encryption options.

  • Keep People Away from Data: Minimize direct data access; rely on automated tools and least-privilege IAM policies.

  • Prepare for Security Events: Plan, simulate, and automate incident detection and response for faster recovery.

Security Domains and Key AWS Services

1️⃣ Identity and Access Management

Establish a secure identity foundation to control access at all levels.

PurposeAWS ServicesDescription
User Access & PermissionsIAMDefine users, roles, and policies with least privilege.
Temporary CredentialsSTS (Security Token Service)Grant temporary access for limited-time operations.
Multi-Account ManagementAWS OrganizationsCentrally manage permissions across multiple accounts.
MFA EnforcementMFA DevicesAdd an extra layer of authentication for privileged users.

2️⃣ Detective Controls

Detect and respond to anomalies and unauthorized changes.

PurposeAWS ServicesDescription
Compliance & Configuration MonitoringAWS ConfigTrack configuration changes and detect non-compliance.
API Activity TrackingAWS CloudTrailLog all API calls for visibility, auditing, and security analysis.
Metrics & AlertsAmazon CloudWatchMonitor performance and trigger alerts when thresholds are exceeded.

3️⃣ Infrastructure Protection

Secure networks, applications, and infrastructure from external and internal threats.

PurposeAWS ServicesDescription
Edge Protection & CDNAmazon CloudFrontDefend against DDoS attacks and improve content security.
Network SegmentationAmazon VPCControl traffic with subnets, security groups, and NACLs.
DDoS ProtectionAWS ShieldAutomatically mitigates distributed denial-of-service attacks.
Web Application FirewallAWS WAFProtects web apps from common exploits (SQLi, XSS, etc.).
Vulnerability ScanningAmazon InspectorContinuously assesses EC2 and container workloads for vulnerabilities.

4️⃣ Data Protection

Ensure that all data is encrypted and access is tightly controlled.

PurposeAWS ServicesDescription
Encryption Key ManagementAWS KMSManage encryption keys for all AWS services.
S3 Encryption OptionsSSE-S3, SSE-KMS, SSE-CEncrypt S3 objects using AWS-managed or customer-managed keys.
Database & Storage EncryptionRDS, EBS, S3Enable encryption at rest and SSL/TLS for data in transit.
Access Control PoliciesS3 Bucket Policies / IAM PoliciesRestrict data access to authorized users and roles only.

5️⃣ Incident Response

Prepare for and respond efficiently to security incidents.

PurposeAWS ServicesDescription
Access Control & IsolationIAMQuickly revoke compromised credentials or restrict access.
Automated RecoveryAWS CloudFormationRebuild environments quickly after a compromise or disaster.
Event Detection & AlertsCloudWatch Events / EventBridgeTrigger automated alerts or workflows when suspicious events occur.

Key Takeaways

  • Security is a shared responsibility between AWS and the customer — AWS secures the cloud, you secure your workloads in the cloud.
  • Strong identity management, encryption, and automation are at the heart of AWS security.
  • Traceability and observability (CloudTrail, Config, CloudWatch) are essential for detection and response.
  • Managed services like Shield, WAF, and Inspector simplify protection across layers.
  • Preparation and incident response automation minimize damage when threats occur.