AWS Security Blog
Category: Advanced (300)
How to set up and track SLAs for resolving Security Hub findings
Your organization can use AWS Security Hub to gain a comprehensive view of your security and compliance posture across your HAQM Web Services (AWS) environment. Security Hub receives security findings from AWS security services and supported third-party products and centralizes them, providing a single view for identifying and analyzing security issues. Security Hub correlates findings […]
Identifying publicly accessible resources with HAQM VPC Network Access Analyzer
August 22, 2022: This post had been updated have the code fixed to make it easier for our readers to execute. Network and security teams often need to evaluate the internet accessibility of all their resources on AWS and block any non-essential internet access. Validating who has access to what can be complicated—there are several […]
How to detect suspicious activity in your AWS account by using private decoy resources
As customers mature their security posture on HAQM Web Services (AWS), they are adopting multiple ways to detect suspicious behavior and notify response teams or workflows to take action. One example is using HAQM GuardDuty to monitor AWS accounts and workloads for malicious activity and deliver detailed security findings for visibility and remediation. Another tactic […]
How to incorporate ACM PCA into your existing Windows Active Directory Certificate Services
Using certificates to authenticate and encrypt data is vital to any enterprise security. For example, companies rely on certificates to provide TLS encryption for web applications so that client data is protected. However, not all certificates need to be issued from a publicly trusted certificate authority (CA). A privately trusted CA can be leveraged to […]
Update of AWS Security Reference Architecture is now available
We’re happy to announce that an updated version of the AWS Security Reference Architecture (AWS SRA) is now available. The AWS SRA is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment. You can use it to help your organization to design, implement, and manage AWS […]
Automatically block suspicious DNS activity with HAQM GuardDuty and Route 53 Resolver DNS Firewall
In this blog post, we’ll show you how to use HAQM Route 53 Resolver DNS Firewall to automatically respond to suspicious DNS queries that are detected by HAQM GuardDuty within your HAQM Web Services (AWS) environment. The Security Pillar of the AWS Well-Architected Framework includes incident response, stating that your organization should implement mechanisms to […]
Correlate IAM Access Analyzer findings with HAQM Macie
In this blog post, you’ll learn how to detect when unintended access has been granted to sensitive data in HAQM Simple Storage Service (HAQM S3) buckets in your HAQM Web Services (AWS) accounts. It’s critical for your enterprise to understand where sensitive data is stored in your organization and how and why it is shared. […]
When and where to use IAM permissions boundaries
Customers often ask for guidance on permissions boundaries in AWS Identity and Access Management (IAM) and when, where, and how to use them. A permissions boundary is an IAM feature that helps your centralized cloud IAM teams to safely empower your application developers to create new IAM roles and policies in HAQM Web Services (AWS). […]
How to use regional SAML endpoints for failover
August 10, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Many HAQM Web Services (AWS) customers choose to use federation with SAML 2.0 in order to use their existing identity provider (IdP) and avoid […]
Choosing the right certificate revocation method in ACM Private CA
AWS Certificate Manager Private Certificate Authority (ACM PCA) is a highly available, fully managed private certificate authority (CA) service that allows you to create CA hierarchies and issue X.509 certificates from the CAs you create in ACM PCA. You can then use these certificates for scenarios such as encrypting TLS communication channels, cryptographically signing code, […]