AWS Well-Architected Security Pillar: What to Review

AWS Well-Architected Framework Security Pillar guide: learn the 7 review domains, what to evaluate first, and how to prepare one workload for review.

May 1st, 2026
11 min read
0views
0likes

Most teams do not need another vague summary of the AWS Well-Architected Framework Security Pillar. They need to know what to evaluate before a review, which evidence to bring, and which security areas fall out of scope when they use stale guidance.

The AWS Well-Architected Framework Security Pillar is a seven-domain workload review model, not just an IAM checklist. It covers security foundations, identity and access management, detection, infrastructure protection, data protection, incident response, and application security. Use it to decide whether one workload has clear owners, traceable access, useful detection, protected data, practiced incident response, and secure delivery controls. If you need the wider context, start with this broader six-pillar overview.

What Is the AWS Well-Architected Framework Security Pillar?

Start with the current seven-domain model. If your review prep is based on a simplified structure, you can miss entire areas of workload risk before the review even starts.

Quick answer: what the pillar protects

AWS defines the AWS Security Pillar overview as protecting data, systems, and assets while using cloud technologies to improve security. The current Security Pillar structure uses 7 design principles, 7 best practice areas, and 11 review questions across these areas:

  • Security foundations
  • Identity and access management
  • Detection
  • Infrastructure protection
  • Data protection
  • Incident response
  • Application security

Those design principles are the reason the evaluation starts with foundations and identity, then moves into traceability, layered protection, data controls, event readiness, and application delivery.

Why the current seven-area model changes review scope

Use the current seven-area model when you prepare a workload review. Older five- or six-area summaries can leave Application security out of scope, which means delivery-pipeline controls, dependency management, and secure deployment practices may never make it into the remediation backlog.

The Security Pillar revision history matters only because it changes what you should bring into the review. Since AWS added Application security as an explicit area and continued updating Security Pillar guidance through 2024, a current review should cover both cloud controls and the way your workload is built, tested, and released.

When this review model is the right tool

Use this review model when you need to judge one workload through the Security Pillar before or during a review. If you need the full question set, use the Well-Architected Review checklist. If you need the wider framework first, use the six-pillar overview.

Why the Security Pillar matters in a workload review

The Security Pillar matters because it turns security from abstract concern into workload questions, evidence, and remediation priorities.

The 11 questions behind the pillar

AWS operationalizes the pillar through 11 questions, SEC 1 through SEC 11. Those questions roll up into the seven domains:

  • Security foundations: SEC 1
  • Identity and access management: SEC 2 and SEC 3
  • Detection: SEC 4
  • Infrastructure protection: SEC 5 and SEC 6
  • Data protection: SEC 7, SEC 8, and SEC 9
  • Incident response: SEC 10
  • Application security: SEC 11

In the AWS Well-Architected Tool, profiles, which capture business context and workload goals, can also mark some questions as prioritized for a specific workload.

What evidence a good review needs

A strong review does not start with tool names. It starts with evidence. For a customer-facing SaaS workload, I want to see:

  • The workload boundary, owner, environment, accounts, and Regions
  • The human and machine identity model plus permission boundaries
  • The logging, finding, and alert path the team actually uses
  • The trust boundaries, data handling model, incident path, and delivery-pipeline controls

That is why Security Pillar prep should feel different from a generic security review checklist. A checklist tells you what to inspect. A pillar review tells you which missing decisions and evidence make the workload risky.

Why workload owners should read this differently from a checklist

The useful questions are direct. Which account boundary contains blast radius? Which identities are still long-lived? Which events matter enough to detect fast? Which data needs stronger handling? Which incident paths have actually been exercised?

Mermaid diagram loading.Workload Definition (owner, scope, accounts, Regions) Security Pillar Review Domains Security Foundations (SEC 1) Identity and Access Management (SEC 2-3) Detection (SEC 4) Infrastructure Protection (SEC 5-6) Data Protection (SEC 7-9) Incident Response (SEC 10) Application Security (SEC 11) Evidence and Notes (findings, owners, context) Profile Prioritization (prioritized questions) Improvement Plan (remediation backlog) PDF Report (review summary) Milestone (point-in-time snapshot)

Evaluate security foundations and identity first

Start here because foundations and identity decide blast radius everywhere else.

Security foundations

AWS treats security foundations as the layer that makes the rest of the pillar operable. For a multi-account SaaS setup, that means clear AWS account boundaries, tighter handling of the management account, preventive guardrails through AWS Organizations or similar patterns, and standard controls deployed as platform patterns instead of one-off fixes. Root user hygiene still matters here: MFA on root, no root access keys, and protected recovery paths.

Identity and access management

AWS splits identity into authentication and authorization for good reason. For people, the preferred pattern is federation through a central identity provider, often with IAM Identity Center, plus temporary credentials instead of standing keys. For machines, the question is whether service identities are short-lived, scoped tightly, and easy to trace.

Least privilege is still the rule, but AWS permissions guidance is clear that it is enforced through layers. Identity policies, resource policies, permission boundaries, ABAC, session policies, and SCPs all matter. PrincipalOrgID and CalledVia are useful current signals. One mistake I keep seeing is treating SCPs as the answer to everything. They are not. They limit member accounts, but they do not grant permissions.

Validate detection, infrastructure protection, and data boundaries

Once the control plane is stable, ask whether the workload can see risk, contain it, and protect data with clear trust boundaries.

Excalidraw diagram loading.

Detection

Detection in the current AWS model means finding unwanted configuration change and unwanted behavior. A review-ready workload should show where logs, findings, and metrics land, who looks at them, and how suspicious activity is investigated. In multi-account setups, I like to see Log Archive and Security Tooling accounts, CloudTrail traceability, GuardDuty findings, Security Hub CSPM rollups, and mutating API visibility.

Infrastructure protection

AWS frames infrastructure protection around explicit trust boundaries and layered controls. Network protection usually means intentional traffic paths plus controls such as AWS WAF, AWS Network Firewall, and Firewall Manager. Compute protection often shows up in the absence of routine SSH or RDP access. The compute protection guidance calls out Systems Manager patterns, so Session Manager, AmazonSSMManagedInstanceCore, and signed artifacts are stronger signals than vague claims about hardened instances.

Data protection

Data protection starts earlier than many teams expect. Before encryption, ask how data is classified, where sensitivity is reduced, and how retention is enforced. For data at rest, AWS KMS is usually the center of gravity, with FIPS 140-3 Level 3 validated HSMs and CloudTrail visibility. For data in transit, check HTTPS enforcement, protocol policy, PrivateLink where it helps, and the current AWS recommendation for TLS 1.3.

Do not leave incident response and application security until the end

These two domains are often underprepared, and they prove the pillar is broader than infrastructure controls.

Incident response

AWS treats incident response as a first-class part of the pillar, organized around preparation, operations, and post-incident activity. In review terms, I want named roles, clear escalation paths, pre-provisioned access, working playbooks, and a lessons-learned loop. Stronger evidence looks like a RACI plus tabletop exercises.

Application security

Application security is now explicit in the pillar, and that change matters. AWS application security guidance breaks it into organization and culture, security of the pipeline, security in the pipeline, and dependency management. In practice, that means workload teams own security properties, deployments happen programmatically, and testing is automated across the lifecycle. SAST, DAST, SBOM generation, CodeGuru Security, Inspector for Lambda code scanning, and CodeArtifact can all support this area.

What strong and weak Security Pillar signals look like before the review

If time is limited, this is the fastest way to self-triage one workload before you open the full question set. The table below is my synthesis of the current AWS categories, not an AWS scoring model.

The seven-domain review table

DomainCore decisionLikely ownerStrong signalCommon weak signal
Security foundationsHow do we contain blast radius and standardize controls?Platform leadAccount map, guardrails, root-user handling, control automation patternsShared environments, manual control setup, unclear root recovery path
Identity and access managementHow do people and machines get only the access they need?Platform and securityIdP flow, permission model, role design, temporary credential patternsLong-lived user keys, broad admin roles, no clear human vs machine identity split
DetectionCan we detect meaningful change and suspicious behavior quickly?Security operationsCloudTrail path, GuardDuty or Security Hub findings, alert routingMissing mutating-API visibility, logs nobody reviews, blind spots across accounts
Infrastructure protectionWhere are trust boundaries enforced at network and compute layers?Platform and workload ownerVPC boundaries, WAF or firewall placement, Session Manager, signed assetsOpen manual admin paths, flat network assumptions, unsigned artifacts
Data protectionWhich data needs special handling, and where is that enforced?Workload owner and securityData classes, KMS model, retention policy, HTTPS and PrivateLink policyUnknown data classification, encryption handled late, transport policy by convention
Incident responseWho responds, with what access, and how is learning captured?Security and operationsRACI, playbooks, simulation cadence, post-incident actionsUntested playbooks, emergency access gaps, no lessons-learned mechanism
Application securityHow are security properties designed and validated through delivery?Engineering leadPipeline controls, scanning, dependency governance, deployment policySecurity checks bolted on late, unmanaged packages, no ownership inside product teams

Which weak signals justify deeper follow-up

If your weak signals cluster around identity, evidence gaps, and runtime blind spots, go next to the common AWS security misconfigurations article or the broader security review checklist. If the same workload is weak across foundations, detection, data protection, and application security, you are usually past the point where ad hoc fixes are enough.

Turn the AWS Security Pillar into a Well-Architected workload review

The AWS Well-Architected review workflow is where the Security Pillar becomes action. AWS uses a workload as the unit of review, which forces scope, ownership, and context before anyone starts answering questions.

What the Tool captures up front

When you define a workload, AWS can capture the name, description, review owner, environment, Regions, optional account IDs, architecture URL, profile association, Jira settings, and optional Trusted Advisor activation.

What comes out of the review

AWS lets you capture notes, mark best practices not applicable, save milestones, generate a PDF report, and work from an improvement plan. A milestone is a point-in-time snapshot of the workload review. The improvement plan is the prioritized backlog of changes that comes out of the answers. If a profile is attached, prioritized questions and prioritized risks become easier to see.

There are also a few practical boundaries worth knowing. The Tool itself has no additional charge. Trusted Advisor integration is optional, tied to the AWS Well-Architected Framework lens, and available only for Business and Enterprise Support customers. Workload sharing is same-Region only, and invitations expire after 7 days if they are not accepted.

When to use the model, the checklist, or a full review

Use this model when you need to triage one workload quickly. Use the full Well-Architected Review checklist when you want the complete question set. Use the Well-Architected review process guide when you need meeting flow, roles, and deliverables. If your concern shifts to a broader hands-on audit of AWS controls, use the security review checklist instead.

Common mistakes, FAQ, and the next step

Weak Security Pillar reviews usually fail for the same reasons: opinions instead of evidence, IAM-only thinking, or no business context for prioritization.

Common mistakes teams make before a security-focused review

  • Treating the Security Pillar as an identity-only discussion
  • Bringing service names with no owner or evidence
  • Ignoring incident response and application security until late
  • Expecting the Tool to replace workload judgment and prioritization

The next step

If you remember only four things from this guide, make them these:

  • The current AWS Well-Architected Framework Security Pillar is a seven-domain model, not a stale IAM summary.
  • Good reviews need owners and evidence, not just a list of enabled services.
  • Incident response and application security are core parts of the pillar now, not optional follow-up topics.
  • The AWS Well-Architected Tool turns the pillar into prioritized review work, notes, reports, and milestones.

The practical next step is simple: define one important workload, bring the account boundary, identity model, logging path, data handling decisions, and pipeline controls into one conversation, then work through the Security Pillar honestly. If you want the exact question set next, use the full Well-Architected Review checklist.

Next step

Get a Security-Focused AWS Well-Architected Review

We review your workloads against the AWS Well-Architected Security Pillar, identify where identity, detection, data, AppSec, and incident-response gaps create real risk, and turn the findings into a prioritized remediation roadmap.

Frequently Asked Questions

What is the security pillar of the AWS Well-Architected Framework?
It is the part of the framework that helps you evaluate how one workload protects data, systems, and assets across seven areas: foundations, identity, detection, infrastructure, data, incident response, and application security.
Why do some pages say the Security Pillar has five or six areas?
Those pages usually reflect older guidance. AWS added Application security as an explicit area on April 10, 2023, and the current model uses seven areas.
What should I evaluate first in the AWS Security Pillar?
Start with security foundations and identity. Account boundaries, root-user handling, federation, temporary credentials, and permission guardrails affect every later control.
Is Application security really part of the current Security Pillar?
Yes. It is a first-class area in the current AWS guidance and covers pipeline security, testing, dependency management, and workload-team ownership.
How is the Security Pillar different from an AWS security checklist?
A checklist tells you which controls to inspect. The Security Pillar helps you evaluate one workload through decisions, evidence, ownership, and follow-up priorities.
How do I use the Security Pillar in the AWS Well-Architected Tool?
Create or update a workload, add the right business context and owners, answer the Security Pillar questions, capture notes, then use the report and improvement plan to prioritize changes.
Do teams actually use the AWS Well-Architected Framework in real life?
Yes, but the value comes from using it as a structured workload conversation, not as a paperwork exercise. The useful output is a clear set of risks, owners, and remediation priorities.
What are the Security Pillar review questions?
They are the SEC 1 through SEC 11 questions in the AWS Well-Architected Framework. This guide groups them by domain; use the full Well-Architected Review checklist when you need every question in order.

Share this article on ↓

Related articles

Subscribe to our newsletter

Get real-world insights from building production AWS infrastructure at scale.

Newsletter signup form loading.

By signing up you agree to our privacy policy.