

# Security in CloudFormation
<a name="security"></a>

Cloud security at AWS is the highest priority. As an AWS customer, you benefit from data centers and network architectures that are built to meet the requirements of the most security-sensitive organizations.

Security is a shared responsibility between AWS and you. The [shared responsibility model](https://aws.amazon.com/compliance/shared-responsibility-model/) describes this as security *of* the cloud and security *in* the cloud:
+ **Security of the cloud** – AWS is responsible for protecting the infrastructure that runs AWS services in the AWS Cloud. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the [AWS Compliance Programs](https://aws.amazon.com/compliance/programs/). To learn about the compliance programs that apply to CloudFormation, see [AWS Services in Scope by Compliance Program](https://aws.amazon.com/compliance/services-in-scope/).
+ **Security in the cloud** – Your responsibility is determined by the AWS service that you use. You are also responsible for other factors including the sensitivity of your data, your company’s requirements, and applicable laws and regulations.

This documentation helps you understand how to apply the shared responsibility model when using CloudFormation. The following topics show you how to configure CloudFormation to meet your security and compliance objectives. You also learn how to use other AWS services that help you to monitor and secure your CloudFormation resources.

**Topics**
+ [Protect CloudFormation stacks from being deleted](using-cfn-protect-stacks.md)
+ [Prevent updates to stack resources](protect-stack-resources.md)
+ [Data protection in CloudFormation](security-data-protection.md)
+ [Control CloudFormation access with AWS Identity and Access Management](control-access-with-iam.md)
+ [Logging CloudFormation API calls with AWS CloudTrail](cfn-api-logging-cloudtrail.md)
+ [Infrastructure security in CloudFormation](infrastructure-security.md)
+ [Resilience in CloudFormation](disaster-recovery-resiliency.md)
+ [Compliance validation for CloudFormation](cloudformation-compliance.md)
+ [Configuration and vulnerability analysis in CloudFormation](vulnerability-analysis-and-management.md)
+ [Security best practices for CloudFormation](security-best-practices.md)
+ [Access CloudFormation using an interface endpoint (AWS PrivateLink)](vpc-interface-endpoints.md)