...
We are using various tools to access security of our application. You can see various reports and practices we follow but not limited to at Security checklistChecklist
Database Access
Database access on aws is configured in such a way that, even application on AWS can not access database if it is not a part of designated security group.
...