AWS Security Blog
Category: Intermediate (200)
ML-KEM post-quantum TLS now supported in AWS KMS, ACM, and Secrets Manager
HAQM Web Services (AWS) is excited to announce that the latest hybrid post-quantum key agreement standards for TLS have been deployed to three AWS services. Today, AWS Key Management Service (AWS KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager endpoints now support Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) for hybrid post-quantum key agreement in non-FIPS endpoints […]
Enhancing cloud security in AI/ML: The little pickle story
As AI and machine learning (AI/ML) become increasingly accessible through cloud service providers (CSPs) such as HAQM Web Services (AWS), new security issues can arise that customers need to address. AWS provides a variety of services for AI/ML use cases, and developers often interact with these services through different programming languages. In this blog post, […]
Effectively implementing resource control policies in a multi-account environment
Every organization strives to empower teams to drive innovation while safeguarding their data and systems from unintended access. For organizations that have thousands of HAQM Web Services (AWS) resources spread across multiple accounts, organization-wide permissions guardrails can help maintain secure and compliant configurations. For example, some AWS services support resource-based policies that can be used to […]
AWS KMS CloudWatch metrics help you better track and understand how your KMS keys are being used
AWS Key Management Service (AWS KMS) is pleased to launch key-level filtering for AWS KMS API usage in HAQM CloudWatch metrics, providing enhanced visibility to help customers improve their operational efficiency and aid in security and compliance risk management. AWS KMS currently publishes account-level AWS KMS API usage metrics to HAQM CloudWatch, enabling you to monitor […]
Four ways to grant cross-account access in AWS
As your HAQM Web Services (AWS) environment grows, you might develop a need to grant cross-account access to resources. This could be for various reasons, such as enabling centralized operations across multiple AWS accounts, sharing resources across teams or projects within your organization, or integrating with third-party services. However, granting cross-account access requires careful consideration […]
From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic
AWS Network Firewall’s automated domain lists feature enhances network security by analyzing HTTP and HTTPS traffic patterns, providing visibility into domain usage, and simplifying the creation and management of outbound traffic controls through domain-based allowlisting.
Enhancing telecom security with AWS
If you’d like to skip directly to the detailed mapping between the CISA guidance and AWS security controls and best practices, visit our Github page. Implementing CISA’s enhanced visibility and hardening guidance for communications infrastructure In response to recent cybersecurity incidents attributed to actors from the People’s Republic of China, a number of cybersecurity agencies […]
HAQM Redshift enhances security by changing default behavior in 2025
Today, I’m thrilled to announce that HAQM Redshift, a widely used, fully managed, petabyte-scale data warehouse, is taking a significant step forward in strengthening the default security posture of our customers’ data warehouses. Some default security settings for newly created provisioned clusters, HAQM Redshift Serverless workgroups, and clusters restored from snapshots have changed. These changes […]
Testing and evaluating GuardDuty detections
HAQM GuardDuty is a threat detection service that continuously monitors, analyzes, and processes HAQM Web Services (AWS) data sources and logs in your AWS environment. GuardDuty uses threat intelligence feeds, such as lists of malicious IP addresses and domains, file hashes, and machine learning (ML) models to identify suspicious and potentially malicious activity in your […]
Announcing upcoming changes to the AWS Security Token Service global endpoint
April 18, 2025: AWS has made changes to the AWS Security Token Service (AWS STS) global endpoint (sts.amazonaws.com) in Regions enabled by default to enhance its resiliency and performance. AWS STS requests to the global endpoint are automatically served in the same AWS Region as your workloads. These changes will not be deployed to opt-in […]