

# Configuration and vulnerability analysis in Deadline Cloud
Configuration and vulnerability analysis

AWS handles basic security tasks like guest operating system (OS) and database patching, firewall configuration, and disaster recovery. These procedures have been reviewed and certified by the appropriate third parties. For more details, see the following resources: 
+ [Shared Responsibility Model](https://aws.amazon.com/compliance/shared-responsibility-model/)
+ [Amazon Web Services: Overview of Security Processes](https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf) (whitepaper)

AWS Deadline Cloud manages tasks on service-managed or customer-managed fleets:
+ For service-managed fleets, Deadline Cloud manages the guest operating system.
+ For customer-managed fleets, you are responsible for managing the operating system.

For additional information about configuration and vulnerability analysis for AWS Deadline Cloud, see
+ [Security best practices for Deadline Cloud](security-best-practices.md)