

How does AWS classify customer information?ĪWS classifies customer information into two categories: customer content and account information.These security protections and control processes are independently validated by multiple third-party independent assessments. Security Assurance: We have developed a security assurance program that uses best practices for global privacy and data protection to help you operate securely within AWS, and to make the best use of our security control environment.If compelled to disclose customer content to a government body, we will give customers reasonable notice of the demand to allow the customer to seek a protective order or other appropriate remedy unless AWS is legally prohibited from doing so. If a governmental body sends AWS a demand for customer content, we will attempt to redirect the governmental body to request that data directly from the customer. Disclosure of customer content: We will not disclose customer content unless we're required to do so to comply with the law or a binding order of a government body.Flexible key management options using AWS Key Management Service (KMS), allowing customers to choose whether to have AWS manage their encryption keys or enabling customers to keep complete control over their keys.Data encryption capabilities available in over 100 AWS services.We offer you industry-leading encryption features to protect your content in transit and at rest, and we provide you with the option to manage your own encryption keys. Security: You choose how your content is secured.We will not move or replicate your content outside of your chosen AWS Region(s) without your agreement, except as necessary to comply with the law or a binding order of a governmental body. You can replicate and back up your content in more than one AWS Region. Storage: You choose the AWS Region(s) in which your content is stored.We never use your content or derive information from it for marketing or advertising purposes. We do not access or use your content for any purpose without your agreement. We provide APIs for you to configure access control permissions for any of the services you develop or deploy in an AWS environment. We provide an advanced set of access, encryption, and logging features to help you do this effectively (e.g., AWS Identity and Access Management, AWS Organizations and AWS CloudTrail).

NEVER READ YOUR OWN PRESS RELEASES FULL
Access: As a customer, you maintain full control of your content that you upload to the AWS services under your AWS account, and responsibility for configuring access to AWS services and resources.We strive to inform you of the privacy and data security policies, practices, and technologies we’ve put in place. Maintaining customer trust is an ongoing commitment. AWS continually monitors the evolving privacy regulatory and legislative landscape to identify changes and determine what tools our customers might need to meet their compliance needs. At AWS, customer trust is our top priority.
