This document discusses common myths about security on AWS and provides responses to address each myth. It covers general cloud security, specific service security, and data security. For each myth, it explains the security controls and shared responsibility model that AWS employs. The document seeks to alleviate concerns about security, compliance, access controls, encryption, patching, data deletion verification and isolation on AWS. It emphasizes that customers own and control their data and have robust tools for access management, monitoring and incident response.