103 Terms

    AWS Security Glossary

    Every AWS security concept explained — from IAM roles to zero trust, with links to our security cards, playbooks, and blog posts.

    A

    Assume Role

    Identity & Access

    The process of obtaining temporary security credentials by calling AWS STS to take on the permissions of an IAM role.

    Access Key

    Identity & Access

    A long-term credential pair (access key ID + secret access key) used to authenticate programmatic requests to AWS. Should be replaced with IAM roles wherever possible.

    AWS Well-Architected Framework

    Architecture & Design

    A set of best practices organized into six pillars (including Security) that help architects build secure, reliable, efficient, and cost-effective cloud workloads.

    Audit Trail

    Monitoring & Detection

    A chronological record of all activities in an AWS account (API calls, logins, configuration changes) used for security investigation and compliance evidence.

    API Gateway Security

    Compute & Serverless

    Security controls for Amazon API Gateway including authentication, authorization, throttling, WAF integration, and mutual TLS.

    AWS PrivateLink

    Network Security

    A technology that provides private connectivity between VPCs, AWS services, and on-premises networks without exposing traffic to the public internet.

    AWS Network Firewall

    Network Security

    A managed stateful network firewall and intrusion prevention system (IPS) for VPCs, supporting domain filtering, protocol inspection, and Suricata-compatible rules.

    AWS Shield

    Network Security

    AWS DDoS protection service with two tiers: Shield Standard (free, automatic L3/L4 protection) and Shield Advanced (paid, enhanced L7 protection with DRT support).

    Amazon Inspector

    Monitoring & Detection

    An automated vulnerability management service that continuously scans EC2 instances, Lambda functions, and container images in ECR for software vulnerabilities and network exposure.

    Amazon Macie

    Monitoring & Detection

    A data security service that uses machine learning to automatically discover, classify, and protect sensitive data (PII, PHI, financial data) stored in Amazon S3.

    AWS Config Rules

    Monitoring & Detection

    Managed or custom rules that continuously evaluate AWS resource configurations against desired settings, flagging non-compliant resources automatically.

    Amazon Detective

    Monitoring & Detection

    A security service that automatically collects and analyzes log data from AWS resources to help investigate and identify the root cause of security findings.

    AWS Organizations

    Compliance & Governance

    A service for centrally managing multiple AWS accounts with consolidated billing, service control policies (SCPs), and organizational units (OUs).

    AWS Control Tower

    Compliance & Governance

    A managed service that automates the setup and governance of a secure, multi-account AWS environment based on AWS best practices (landing zone).

    AWS Certificate Manager

    Data Protection

    A service that provisions, manages, and auto-renews public and private SSL/TLS certificates for use with AWS services like ELB, CloudFront, and API Gateway.

    AWS CloudHSM

    Data Protection

    A cloud-based hardware security module (HSM) that lets you generate and use your own encryption keys on FIPS 140-2 Level 3 validated hardware in AWS.

    Attribute-Based Access Control (ABAC)

    Identity & Access

    An IAM authorization strategy that uses tags (attributes) on principals and resources to define permissions, scaling better than traditional role-based access control.

    AWS Audit Manager

    Compliance & Governance

    A service that continuously audits AWS usage to simplify risk assessment and compliance with regulations like PCI DSS, HIPAA, SOC 2, and GDPR.

    AWS Artifact

    Compliance & Governance

    A self-service portal for on-demand access to AWS compliance reports (SOC, PCI, ISO) and security agreements (BAA, NDA) at no cost.

    C

    Confused Deputy Problem

    Identity & Access

    A security vulnerability where a trusted service is tricked into acting on behalf of an unauthorized party, typically prevented in AWS using external ID conditions.

    Cross-Account Access

    Identity & Access

    The ability to grant permissions for identities in one AWS account to access resources in another, typically using IAM roles with trust policies.

    Credential Rotation

    Data Protection

    The practice of regularly replacing access keys, passwords, and secrets with new values to limit the window of exposure if a credential is compromised.

    CloudTrail

    Monitoring & Detection

    AWS service that records every API call made in your account, providing an audit trail of who did what, when, and from where.

    Compliance

    Compliance & Governance

    Meeting regulatory requirements and industry standards (SOC 2, HIPAA, GDPR, PCI DSS, CIS) for data protection, access control, and security practices in the cloud.

    CIS Benchmark

    Compliance & Governance

    A prescriptive security configuration checklist from the Center for Internet Security that defines best practices for securing AWS accounts.

    Containment

    Incident Response

    The incident response phase where you isolate affected resources to prevent the threat from spreading - deactivating keys, quarantining instances, blocking network access.

    Cloud Forensics

    Incident Response

    The practice of collecting, preserving, and analyzing digital evidence from cloud resources after a security incident to understand what happened and how.

    Cloud Security Posture Management (CSPM)

    Architecture & Design

    Automated tools that continuously assess cloud infrastructure for misconfigurations, compliance violations, and security risks - in AWS, provided by Security Hub and Config.

    Container Security

    Compute & Serverless

    Security practices for containerized workloads on AWS (ECS, EKS, Fargate) including image scanning, runtime security, and network policies.

    Cognito Security

    Identity & Access

    Amazon Cognito provides user authentication and authorization for web/mobile apps with user pools (sign-up/sign-in) and identity pools (temporary AWS credentials).

    Credential Compromise

    Incident Response

    When AWS access keys, session tokens, or passwords are exposed to unauthorized parties - the #1 most common AWS security incident.

    CloudWatch Security Monitoring

    Monitoring & Detection

    Using Amazon CloudWatch for security monitoring - metric alarms for unauthorized API calls, log insights for investigation, and anomaly detection for unusual patterns.

    I

    IAM Role

    Identity & Access

    An AWS identity with temporary credentials that can be assumed by users, services, or applications to perform actions without long-term access keys.

    IAM Policy

    Identity & Access

    A JSON document that defines permissions - which actions are allowed or denied on which AWS resources, and under what conditions.

    Identity Federation

    Identity & Access

    The process of allowing external identities (corporate directory, social providers) to access AWS resources without creating IAM users, using SAML, OIDC, or IAM Identity Center.

    Incident Response

    Incident Response

    The structured process of detecting, containing, eradicating, and recovering from a security incident, following frameworks like NIST SP 800-61.

    Infrastructure as Code (IaC)

    Architecture & Design

    Managing and provisioning cloud infrastructure through machine-readable configuration files instead of manual processes, enabling version control, repeatability, and security review.

    IAM Access Analyzer

    Identity & Access

    An AWS service that analyzes resource policies to identify resources shared with external entities and generates least-privilege policies from access activity.

    IAM Identity Center

    Identity & Access

    The recommended AWS service for managing workforce access to multiple AWS accounts and applications with SSO, replacing the need for IAM users.

    Incident Response Playbook

    Incident Response

    A step-by-step documented procedure for handling specific security incidents - from detection through containment, eradication, recovery, and lessons learned.

    IAM User

    Identity & Access

    An AWS identity representing a person or application with long-term credentials. AWS recommends replacing IAM users with IAM Identity Center for humans and IAM roles for machines.

    S

    Service Control Policy (SCP)

    Identity & Access

    An organization-wide guardrail that restricts what actions member accounts can perform, regardless of their IAM policies.

    Single Sign-On (SSO)

    Identity & Access

    A centralized authentication mechanism that allows users to log in once and access multiple AWS accounts and applications without re-entering credentials.

    Secrets Management

    Data Protection

    The practice of securely storing, accessing, and rotating sensitive data like API keys, database passwords, and tokens using services like AWS Secrets Manager.

    Security Group

    Network Security

    A virtual firewall for EC2 instances and other resources that controls inbound and outbound traffic at the instance level using allow rules.

    Security Hub

    Monitoring & Detection

    AWS service that aggregates security findings from GuardDuty, Inspector, Macie, and third-party tools into a single dashboard with compliance scoring.

    Shared Responsibility Model

    Compliance & Governance

    The framework defining that AWS is responsible for security of the cloud (infrastructure), while customers are responsible for security in the cloud (data, access, configuration).

    Server-Side Encryption (SSE)

    Data Protection

    Encryption performed by AWS on data after it is received by the service, protecting it at rest without requiring client-side encryption logic.

    S3 Security

    Storage & Database

    Security controls for Amazon S3 including Block Public Access, bucket policies, encryption, access points, Object Lock, and access logging.

    Session Policy

    Identity & Access

    An inline IAM policy passed when assuming a role or federating, which further restricts the session permissions to an intersection of the role policy and session policy.

    Security Baseline

    Compliance & Governance

    A minimum set of security configurations that every AWS account must have - including CloudTrail, Config, GuardDuty, default encryption, and root account protection.

    Security Incident

    Incident Response

    An event that threatens the confidentiality, integrity, or availability of AWS resources - including unauthorized access, data breaches, malware, and DDoS attacks.

    Security Pillar

    Architecture & Design

    One of six pillars of the AWS Well-Architected Framework, covering identity management, detection, infrastructure protection, data protection, and incident response.

    Security as Code

    Architecture & Design

    The practice of defining security controls, policies, and configurations in version-controlled code - enabling automated, repeatable, and auditable security.

    Secrets Rotation

    Data Protection

    The automated process of periodically changing credentials (database passwords, API keys, tokens) to limit the window of exposure if compromised.

    Need Help Implementing These Concepts?

    Our AWS security experts can help you apply these best practices to your cloud infrastructure.

    Contact Us