AWS Security Blog

Category: Intermediate (200)

How to use on-demand rotation for AWS KMS imported keys

Today, we’re announcing support for on-demand rotation of symmetric encryption AWS Key Management Service (AWS KMS) keys with imported key material (EXTERNAL origin). This new capability enables you to rotate the cryptographic key material of these keys without changing the key identifier (key ID or HAQM Resource Name (ARN)). Rotating keys helps you meet compliance […]

AI lifecycle risk management: ISO/IEC 42001:2023 for AI governance

As AI becomes central to business operations, so does the need for responsible AI governance. But how can you make sure that your AI systems are ethical, resilient, and aligned with compliance standards? ISO/IEC 42001, the international management system standard for AI, offers a framework to help organizations implement AI governance across the lifecycle. In […]

Implementing safety guardrails for applications using HAQM SageMaker

Large Language Models (LLMs) have become essential tools for content generation, document analysis, and natural language processing tasks. Because of the complex non-deterministic output generated by these models, you need to apply robust safety measures to help prevent inappropriate outputs and protect user interactions. These measures are crucial to address concerns such as the risk […]

ML-KEM post-quantum TLS now supported in AWS KMS, ACM, and Secrets Manager

HAQM Web Services (AWS) is excited to announce that the latest hybrid post-quantum key agreement standards for TLS have been deployed to three AWS services. Today, AWS Key Management Service (AWS KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager endpoints now support Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) for hybrid post-quantum key agreement in non-FIPS endpoints […]

Enhancing cloud security in AI/ML: The little pickle story

As AI and machine learning (AI/ML) become increasingly accessible through cloud service providers (CSPs) such as HAQM Web Services (AWS), new security issues can arise that customers need to address. AWS provides a variety of services for AI/ML use cases, and developers often interact with these services through different programming languages. In this blog post, […]

Effectively implementing resource control policies in a multi-account environment

Every organization strives to empower teams to drive innovation while safeguarding their data and systems from unintended access. For organizations that have thousands of HAQM Web Services (AWS) resources spread across multiple accounts, organization-wide permissions guardrails can help maintain secure and compliant configurations. For example, some AWS services support resource-based policies that can be used to […]

AWS KMS CloudWatch metrics help you better track and understand how your KMS keys are being used

AWS Key Management Service (AWS KMS) is pleased to launch key-level filtering for AWS KMS API usage in HAQM CloudWatch metrics, providing enhanced visibility to help customers improve their operational efficiency and aid in security and compliance risk management. AWS KMS currently publishes account-level AWS KMS API usage metrics to HAQM CloudWatch, enabling you to monitor […]

Four ways to grant cross-account access in AWS

As your HAQM Web Services (AWS) environment grows, you might develop a need to grant cross-account access to resources. This could be for various reasons, such as enabling centralized operations across multiple AWS accounts, sharing resources across teams or projects within your organization, or integrating with third-party services. However, granting cross-account access requires careful consideration […]

From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic

AWS Network Firewall’s automated domain lists feature enhances network security by analyzing HTTP and HTTPS traffic patterns, providing visibility into domain usage, and simplifying the creation and management of outbound traffic controls through domain-based allowlisting.

Enhancing telecom security with AWS

If you’d like to skip directly to the detailed mapping between the CISA guidance and AWS security controls and best practices, visit our Github page.  Implementing CISA’s enhanced visibility and hardening guidance for communications infrastructure In response to recent cybersecurity incidents attributed to actors from the People’s Republic of China, a number of cybersecurity agencies […]