Amazon Web Services

AWS is a subsidiary of Amazon that provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive abstract technical infrastructure and distributed computing building blocks and tools.

Amazon Web Services's logo


Location(s)

AWS has 31 zones(s) in 22 countries:

  • Europe
  • North America
  • South America
  • Central America
  • Asia
  • Africa
  • Russia
  • Pacific


Certifications

BSI C5 Type 1

Specifies minimum requirements for secure cloud computing and is primarily …

BSI C5 Type 2

Specifies minimum requirements for secure cloud computing and is primarily …

CCCS

Comprehensive evaluation and analysis of cyber threats and vulnerabilities in …

CISPE

CJIS Security Policy

Guidelines and standards established by the FBI to ensure the …

CMMC

Designed to protect sensitive unclassified information that is shared by …

CPSTIC

Sandards and guidelines for information security in public administrations and …

CSA Star

The industry's most powerful program for security assurance in the …

CyberVadis

Third-party risk and cybersecurity risk management

DCCS

Security model by which DoD will leverage cloud computing along …

DESC Security Standard

Requirements and guidance for CSPs and those organizations using any …

DFARS

Cybersecurity requirements for contractors handling controlled unclassified information within the …

ENS

Set of security standards and requirements established by the Spanish …

FedRAMP

Cost-effective, risk-based approach for the adoption and use of cloud …

FERPA

Federal law that affords parents the right to have access …

finma

Protect financial market clients and ensure the proper functioning of …

FIPS

US and Canadian government standard that specifies the security requirements …

FISC guidelines

Set of security standards and best practice to enhance the …

FISMA

Framework of guidelines and security standards to protect government information …

G-Cloud

UK government program to promote government-wide adoption of cloud computing.

GNS

Protecting classified data processing and transmission.

GSMA

Security Assurance and Certification

GxP

Ensure a product is safe and meets its intended use.

HDS

Strengthen the protection of personal health data and build an …

HIPAA

Federal law that required the creation of national standards to …

HITRUST

Set of security and privacy controls and standards designed to …

IAR

Provide management and technical information security controls for entities to …

ISO 20000:2018

Service management - Part 1: Service management system requirements

ISO 22301:2019

Security and resilience — Business continuity management systems — Requirements

ISO 27001:2022

Code of practice for information security controls based on ISO/IEC …

ISO 27015:2017

Code of practice for information security controls based on ISO/IEC …

ISO 27018:2019

Code of practice for protection of personally identifiable information (PII) …

ISO 27701:2019

Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information …

ISO 9001:2015

Quality management systems — Requirements

ITAR

Regulations to prevent the unauthorized export of defense and military-related …

K-ISMS

Certification program in South Korea for organizations to ensure robust …

MPA

Protect intellectual property, prevent piracy, and secure sensitive content throughout …

NHS DSPT

Self-assessment tool that allows organisations to measure their performance against …

NIST 800-53

Catalog of security and privacy controls for all U.S. federal …

orap

None

OSPAR

Evaluates the security and compliance practices of external service providers, …

PASF

Specific security standards and protocols to safeguard sensitive information, evidence …

PCI-DSS

Information security standard for organizations that handle branded credit cards …

Pinakes

Rating framework intended to manage and monitor the cybersecurity controls …

PIPEDA

Governs how private sector organizations collect, use, and disclose personal …

PiTuKri

Evaluates the effectiveness of controls and processes according to international …

ProcessUnity

Third-party risk and cybersecurity risk management

SEC Rules 17a-4 18a-6

Mandate specific recordkeeping and retention requirements for broker-dealers and investment …

SNI 27001

Indonesian national standard based on the ISO/IEC 27001 framework, outlining …

SOC 1 Type II

Internal Control over Financial Reporting

SOC 2 Type II

Trust Services Criteria

SOC 3

Trust Services Criteria for General Use Report

TISAX

Secure processing of information from business partners, the protection of …