Protection of the confidentiality, integrity and availability of computing systems and data. Uses of redundant and layered controls, continuous validation and testing, and automation to ensure that the Amazon Web Services (AWS) and cloud infrastructures are continuously monitored and protected. Examination of shared responsibility models.