AWS bedste praksis

Som partner med AWS kan du være sikker på, at din platform kører sikkert, og din virksomhed har det mest fleksible og sikre cloud computing-miljø, der findes i dag. Alle data hostes i AWS-datacentre og inden for et netværk, der er designet til at beskytte dine oplysninger, identiteter, applikationer og enheder. Det betyder, at du ved, at din virksomhed altid understøttes af centrale sikkerheds- og overholdelseskrav, såsom datalokalitet, beskyttelse og fortrolighed inden for vores omfattende partnertjenester og -funktioner.

De fordele, du får fra AWS Security-platformen, er blandt andet, at du nemt kan skalere din virksomhed, og at din løsning er bygget med de højeste standarder for privatlivs- og datasikkerhedsinfrastruktur og de mest omfattende sikkerheds- og overholdelseskontroller til en skalerbar platform til begivenhedsstyring, test og revision.

Opbevaring af data

With AWS, you control where your data is stored, who can access it, and what resources your organization is consuming at any given moment. Fine-grain identity and access controls combined with continuous monitoring for near real-time security information ensures that the right resources have the right access at all times, wherever your information is stored. Reduce risk as you scale by using security automation and activity monitoring services to detect suspicious security events, like configuration changes, across your ecosystem. You can even integrate the services with your existing solutions to support existing workflows, streamline your operations, and simplify compliance reporting.

AWS is vigilant about your privacy. Because customers care deeply about data security, a world-class team of security experts monitors the systems 24×7 to protect your content. With the AWS hosted solution, you build on the most secure global infrastructure, knowing you always own your data, including the ability to encrypt it, move it, and manage retention. All data flowing across the AWS global network that interconnects datacenters and regions is automatically encrypted at the physical layer before it leaves our secured facilities. Additional encryption layers exist as well; for example, all VPC cross-region peering traffic, and customer or service-to-service TLS connections.

AWS tools allow you to easily encrypt data in transit and at rest to help ensure that only authorized users can access it, using keys managed by our AWS Key Management System (KMS) or managing your own encryption keys with CloudHSM using FIPS 140-2 Level 3 validated HSMs. AWS also gives you the control and visibility to help demonstrate that you comply with regional and local data privacy laws and regulations. The design of the global infrastructure allows you to retain complete control over the regions in which your data is physically located, helping you meet data residency requirements.

Choose a different country to view content for your location.