AWS Security Blog

Category: Advanced (300)

AWS Security Hub

How to set up and track SLAs for resolving Security Hub findings

Your organization can use AWS Security Hub to gain a comprehensive view of your security and compliance posture across your HAQM Web Services (AWS) environment. Security Hub receives security findings from AWS security services and supported third-party products and centralizes them, providing a single view for identifying and analyzing security issues. Security Hub correlates findings […]

VPC Network Access Analyzer

Identifying publicly accessible resources with HAQM VPC Network Access Analyzer

August 22, 2022: This post had been updated have the code fixed to make it easier for our readers to execute. Network and security teams often need to evaluate the internet accessibility of all their resources on AWS and block any non-essential internet access. Validating who has access to what can be complicated—there are several […]

Accesses to decoy resources automatically create custom Security Hub findings

How to detect suspicious activity in your AWS account by using private decoy resources

As customers mature their security posture on HAQM Web Services (AWS), they are adopting multiple ways to detect suspicious behavior and notify response teams or workflows to take action. One example is using HAQM GuardDuty to monitor AWS accounts and workloads for malicious activity and deliver detailed security findings for visibility and remediation. Another tactic […]

How to incorporate ACM PCA into your existing Windows Active Directory Certificate Services

Using certificates to authenticate and encrypt data is vital to any enterprise security. For example, companies rely on certificates to provide TLS encryption for web applications so that client data is protected. However, not all certificates need to be issued from a publicly trusted certificate authority (CA). A privately trusted CA can be leveraged to […]

Update of AWS Security Reference Architecture is now available

We’re happy to announce that an updated version of the AWS Security Reference Architecture (AWS SRA) is now available. The AWS SRA is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment. You can use it to help your organization to design, implement, and manage AWS […]

Automatically block suspicious DNS activity with HAQM GuardDuty and Route 53 Resolver DNS Firewall

In this blog post, we’ll show you how to use HAQM Route 53 Resolver DNS Firewall to automatically respond to suspicious DNS queries that are detected by HAQM GuardDuty within your HAQM Web Services (AWS) environment. The Security Pillar of the AWS Well-Architected Framework includes incident response, stating that your organization should implement mechanisms to […]

Correlate IAM Access Analyzer findings with HAQM Macie

In this blog post, you’ll learn how to detect when unintended access has been granted to sensitive data in HAQM Simple Storage Service (HAQM S3) buckets in your HAQM Web Services (AWS) accounts. It’s critical for your enterprise to understand where sensitive data is stored in your organization and how and why it is shared. […]

When and where to use IAM permissions boundaries

Customers often ask for guidance on permissions boundaries in AWS Identity and Access Management (IAM) and when, where, and how to use them. A permissions boundary is an IAM feature that helps your centralized cloud IAM teams to safely empower your application developers to create new IAM roles and policies in HAQM Web Services (AWS). […]

Choosing the right certificate revocation method in ACM Private CA

AWS Certificate Manager Private Certificate Authority (ACM PCA) is a highly available, fully managed private certificate authority (CA) service that allows you to create CA hierarchies and issue X.509 certificates from the CAs you create in ACM PCA. You can then use these certificates for scenarios such as encrypting TLS communication channels, cryptographically signing code, […]