AWS Security Blog
Category: Advanced (300)
Deploy an automated ChatOps solution for remediating HAQM Macie findings
The amount of data being collected, stored, and processed by HAQM Web Services (AWS) customers is growing at an exponential rate. In order to keep pace with this growth, customers are turning to scalable cloud storage services like HAQM Simple Storage Service (HAQM S3) to build data lakes at the petabyte scale. Customers are looking […]
How to visualize multi-account HAQM Inspector findings with HAQM Elasticsearch Service
September 9, 2021: HAQM Elasticsearch Service has been renamed to HAQM OpenSearch Service. See details. HAQM Inspector helps to improve the security and compliance of your applications that are deployed on HAQM Web Services (AWS). It automatically assesses HAQM Elastic Compute Cloud (HAQM EC2) instances and applications on those instances. From that assessment, it generates […]
Detecting sensitive data in DynamoDB with Macie
HAQM Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in HAQM Web Services (AWS). It gives you the ability to automatically scan for sensitive data and get an inventory of your HAQM Simple Storage Service (HAQM S3) buckets. […]
Use Macie to discover sensitive data as part of automated data pipelines
Data is a crucial part of every business and is used for strategic decision making at all levels of an organization. To extract value from their data more quickly, HAQM Web Services (AWS) customers are building automated data pipelines—from data ingestion to transformation and analytics. As part of this process, my customers often ask how […]
How to protect a self-managed DNS service against DDoS attacks using AWS Global Accelerator and AWS Shield Advanced
In this blog post, I show you how to improve the distributed denial of service (DDoS) resilience of your self-managed Domain Name System (DNS) service by using AWS Global Accelerator and AWS Shield Advanced. You can use those services to incorporate some of the techniques used by HAQM Route 53 to protect against DDoS attacks. […]
Techniques for writing least privilege IAM policies
December 4, 2020: We’ve updated this post to use s3:CreateBucket to simplify the intro example, replaced figure 8 removing the IfExists reference, and clarified qualifier information in the example. In this post, I’m going to share two techniques I’ve used to write least privilege AWS Identity and Access Management (IAM) policies. If you’re not familiar […]
Centrally manage AWS WAF (API v2) and AWS Managed Rules at scale with Firewall Manager
October 29, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. September 9, 2021: HAQM Elasticsearch Service has been renamed to HAQM OpenSearch Service. See details. […]
Investigate VPC flow with HAQM Detective
Many HAQM Web Services (AWS) customers need enhanced insight into IP network flow. Traditionally, cost, the complexity of collection, and the time required for analysis has led to incomplete investigations of network flows. Having good telemetry is paramount, and VPC Flow Logs are a very important part of a robust centralized logging architecture. The information […]
Round 2 post-quantum TLS is now supported in AWS KMS
January 30, 2024: The API in this blog post has been changed in newer version of the AWS CRT Client. See this page for more info. January 25, 2023: AWS KMS, ACM, Secrets Manager TLS endpoints have been updated to only support NIST’s Round 3 picked KEM, Kyber. s2n-tls and s2n-quic have also been updated […]
How to record a video of HAQM AppStream 2.0 streaming sessions
HAQM AppStream 2.0 is a fully managed service that lets you stream applications and desktops to your users. In this post, I’ll show you how to record a video of AppStream 2.0 streaming sessions by using FFmpeg, a popular media framework. There are many use cases for session recording, such as auditing administrative access, troubleshooting […]