AWS Security Blog
Category: Architecture
Patterns for consuming custom log sources in HAQM Security Lake
As security best practices have evolved over the years, so has the range of security telemetry options. Customers face the challenge of navigating through security-relevant telemetry and log data produced by multiple tools, technologies, and vendors while trying to monitor, detect, respond to, and mitigate new and existing security issues. In this post, we provide […]
How to visualize HAQM Security Lake findings with HAQM QuickSight
Part 2 of a 3-part series Part 1 – Aggregating, searching, and visualizing log data from distributed sources with HAQM Athena and HAQM QuickSight Part 3 – How to share security telemetry per Organizational Unit using HAQM Security Lake and AWS Lake Formation In this post, we expand on the earlier blog post Ingest, transform, […]
How to encrypt sensitive caller voice input in HAQM Lex
In the telecommunications industry, sensitive authentication and user data are typically received through mobile voice and keypads, and companies are responsible for protecting the data obtained through these channels. The increasing use of voice-driven interactive voice response (IVR) has resulted in a need to provide solutions that can protect user data that is gathered from […]
Updates to the security pillar of the AWS Well-Architected Framework
We have updated the security pillar of the AWS Well-Architected Framework, based on customer feedback and new best practices. In this post, I’ll take you through the highlights of the updates to the security information in the Security Pillar whitepaper and the AWS Well-Architected Tool, and explain the new best practices and guidance. AWS developed […]