We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.
If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”
Customize cookie preferences
We use cookies and similar tools (collectively, "cookies") for the following purposes.
Essential
Essential cookies are necessary to provide our site and services and cannot be deactivated. They are usually set in response to your actions on the site, such as setting your privacy preferences, signing in, or filling in forms.
Performance
Performance cookies provide anonymous statistics about how customers navigate our site so we can improve site experience and performance. Approved third parties may perform analytics on our behalf, but they cannot use the data for their own purposes.
Allowed
Functional
Functional cookies help us provide useful site features, remember your preferences, and display relevant content. Approved third parties may set these cookies to provide certain site features. If you do not allow these cookies, then some or all of these services may not function properly.
Allowed
Advertising
Advertising cookies may be set through our site by us or our advertising partners and help us deliver relevant marketing content. If you do not allow these cookies, you will experience less relevant advertising.
Allowed
Blocking some types of cookies may impact your experience of our sites. You may review and change your choices at any time by selecting Cookie preferences in the footer of this site. We and selected third-parties use cookies or similar technologies as specified in the AWS Cookie Notice.
Your privacy choices
We display ads relevant to your interests on AWS sites and on other properties, including cross-context behavioral advertising. Cross-context behavioral advertising uses data from one site or app to advertise to you on a different company’s site or app.
To not allow AWS cross-context behavioral advertising based on cookies or similar technologies, select “Don't allow” and “Save privacy choices” below, or visit an AWS site with a legally-recognized decline signal enabled, such as the Global Privacy Control. If you delete your cookies or visit this site from a different browser or device, you will need to make your selection again. For more information about cookies and how we use them, please read our AWS Cookie Notice.
Bu içerik seçilen dilde kullanılamıyor. İçeriğimizi seçilen dilde sunmak için sürekli olarak çalışmaya devam ediyoruz. Sabrınız için teşekkürler.
Data Protection & Privacy at AWS
Build with comprehensive data protection in the cloud
Earning customer trust is the foundation of our business at AWS and we know you trust us to protect your most critical and sensitive assets: your data. We earn this trust by working closely with you to understand your data protection needs, and by offering the most comprehensive set of services, tooling, and expertise to help you protect your data. To do this, we provide technical, operational, and contractual measures needed to protect your data. With AWS, you manage the privacy controls of your data, control how your data is used, who has access to it, and how it is encrypted. We underpin these capabilities with the most flexible and secure cloud computing environment available today.
Earning customer trust is the foundation of our business at AWS and we know you trust us to protect your most critical and sensitive assets: your data. We earn this trust by working closely with you to understand your data protection needs, and by offering the most comprehensive set of services, tooling, and expertise to help you protect your data. To do this, we provide technical, operational, and contractual measures needed to protect your data. With AWS, you manage the privacy controls of your data, control how your data is used, who has access to it, and how it is encrypted. We underpin these capabilities with the most flexible and secure cloud computing environment available today.
With AWS, you control your data by using powerful AWS services and tools to determine where your data is stored, how it is secured, and who has access to it. Services such as AWS Identity and Access Management (IAM) allow you to securely manage access to AWS services and resources. AWS CloudTrail and Amazon Macie enable compliance, detection, and auditing, while AWS CloudHSM and AWS Key Management Service (KMS) allow you to securely generate and manage encryption keys. AWS Control Tower provides governance and controls for data residency.
We continuously raise the bar on privacy safeguards with services and features that let you to implement your own privacy controls, including advanced access, encryption, and logging features. We make it easy to encrypt data in transit and at rest using keys either managed by AWS or fully managed by you. You can bring your own keys that were generated and managed outside of AWS. We implement consistent and scalable processes to
manage privacy, including how data is collected, used, accessed, stored, and deleted. We provide a wide variety of best practice documents, training, and guidance that you can leverage to protect your data, such as the
Security Pillar of the AWS Well-Architected Framework. We only process customer data - that is any personal data you upload to your AWS account - under your documented instructions and do not access, use, or share your data without your agreement, except as required to prevent fraud and abuse, or to comply with law, as described in our
AWS Customer Agreement and
AWS GDPR Data Processing Addendum. Thousands of customers who are subject to
GDPR,
PCI, and
HIPAA use AWS services for these types of workloads. AWS has achieved numerous internationally-recognized certifications and accreditations, demonstrating compliance with rigorous international standards, such as
ISO 27017 for cloud security,
ISO 27701 for privacy information management, and
ISO 27018 for cloud privacy. We do not use customer data or derive information from it for marketing or advertising purposes.
You can choose to store your customer data in any one or more of our AWS Regions around the world. You can also use AWS services with the confidence that customer data stays in the AWS Region you select. A small number of AWS services involve the transfer of data, for example, to develop and improve those services, where you can opt-out of the transfer, or because transfer is an essential part of the service (such as a content delivery service). We prohibit -- and our systems are designed to prevent -- remote access by AWS personnel to customer data for any purpose, including service maintenance, unless that access is requested by you or unless access is required to prevent fraud and abuse, or to comply with law. If we receive a law enforcement request, we will challenge law enforcement requests for customer data from governmental bodies where the requests conflict with law, are overbroad, or where we otherwise have appropriate grounds to do so. We also provide a bi-annual Information Request Report describing the types and number of information requests AWS receives from law enforcement.
At AWS, security is our top priority and security in the cloud is a shared responsibility between AWS and our customer. Financial services providers, healthcare providers, and governmental agencies are among the customers, who trust us with some of their most sensitive information. You can improve your ability to meet core security, confidentiality, and compliance requirements with our comprehensive services, whether that's through Amazon GuardDuty or our AWS Nitro System, the underlying platform for our EC2 instances. We've designed the Nitro System to have workload confidentiality and no operator access. With the Nitro System, there’s no mechanism for any system or person to log in to EC2 servers, read the memory of EC2 instances, or access any data stored on instance storage and encrypted EBS volumes. In addition, services such as AWS CloudHSM and AWS Key Management Service allow you to securely generate and manage encryption keys, and AWS Config and AWS CloudTrail deliver monitoring and logging capabilities for compliance and audits.
AWS Digital Sovereignty Pledge: Control without compromise
We are committed to helping our customers meetdigital sovereignty requirements and offering all AWS customers the most advanced set of sovereignty controls and features available in the cloud.
We are transparent about how AWS services process the personal data you upload to your AWS account and we provide capabilities that allow you to encrypt, delete, and monitor the processing of your customer data.
We’ve launched two new online resources to help customers more easily complete data transfer assessments and comply with the GDPR, taking into account EDPB recommendations.
We work closely with EU customers to understand their data protection needs and offer the most comprehensive set of services, tooling, and resources to help protect their data.
We are transparent about how AWS services process the personal data you upload to your AWS account and we provide capabilities that allow you to encrypt, delete, and monitor the processing of your customer data.
We’ve launched two new online resources to help customers more easily complete data transfer assessments and comply with the GDPR, taking into account EDPB recommendations.
We work closely with EU customers to understand their data protection needs and offer the most comprehensive set of services, tooling, and resources to help protect their data.
We are transparent about how AWS services process the personal data you upload to your AWS account and we provide capabilities that allow you to encrypt, delete, and monitor the processing of your customer data.
We’ve launched two new online resources to help customers more easily complete data transfer assessments and comply with the GDPR, taking into account EDPB recommendations.
We work closely with EU customers to understand their data protection needs and offer the most comprehensive set of services, tooling, and resources to help protect their data.
We are transparent about how AWS services process the personal data you upload to your AWS account and we provide capabilities that allow you to encrypt, delete, and monitor the processing of your customer data.
We’ve launched two new online resources to help customers more easily complete data transfer assessments and comply with the GDPR, taking into account EDPB recommendations.
We work closely with EU customers to understand their data protection needs and offer the most comprehensive set of services, tooling, and resources to help protect their data.
We are transparent about how AWS services process the personal data you upload to your AWS account and we provide capabilities that allow you to encrypt, delete, and monitor the processing of your customer data.
We’ve launched two new online resources to help customers more easily complete data transfer assessments and comply with the GDPR, taking into account EDPB recommendations.
We work closely with EU customers to understand their data protection needs and offer the most comprehensive set of services, tooling, and resources to help protect their data.
We are transparent about how AWS services process the personal data you upload to your AWS account and we provide capabilities that allow you to encrypt, delete, and monitor the processing of your customer data.
We’ve launched two new online resources to help customers more easily complete data transfer assessments and comply with the GDPR, taking into account EDPB recommendations.
We work closely with EU customers to understand their data protection needs and offer the most comprehensive set of services, tooling, and resources to help protect their data.