AWS Security Blog
Category: Intermediate (200)
Security considerations for running containers on HAQM ECS
January 11, 2024: We’ve updated this post to include information about HAQM GuardDuty Runtime Monitoring for HAQM ECS clusters. If you’re looking to enhance the security of your containers on HAQM Elastic Container Service (HAQM ECS), you can begin with the six tips that we’ll cover in this blog post. These curated best practices are […]
Transforming transactions: Streamlining PCI compliance using AWS serverless architecture
Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is critical for organizations that handle cardholder data. Achieving and maintaining PCI DSS compliance can be a complex and challenging endeavor. Serverless technology has transformed application development, offering agility, performance, cost, and security. In this blog post, we examine the benefits of using AWS […]
Prepare your AWS workloads for the “Operational risks and resilience – banks” FINMA Circular
In December 2022, FINMA, the Swiss Financial Market Supervisory Authority, announced a fully revised circular called Operational risks and resilience – banks that will take effect on January 1, 2024. The circular will replace the Swiss Bankers Association’s Recommendations for Business Continuity Management (BCM), which is currently recognized as a minimum standard. The new circular […]
Scaling national identity schemes with itsme and HAQM Cognito
In this post, we demonstrate how you can use identity federation and integration between the identity provider itsme® and HAQM Cognito to quickly consume and build digital services for citizens on HAQM Web Services (AWS) using available national digital identities. We also provide code examples and integration proofs of concept to get you started quickly. […]
Evolving cyber threats demand new security approaches – The benefits of a unified and global IT/OT SOC
In this blog post, we discuss some of the benefits and considerations organizations should think through when looking at a unified and global information technology and operational technology (IT/OT) security operations center (SOC). Although this post focuses on the IT/OT convergence within the SOC, you can use the concepts and ideas discussed here when thinking […]
Mask and redact sensitive data published to HAQM SNS using managed and custom data identifiers
Today, we’re announcing a new capability for HAQM Simple Notification Service (HAQM SNS) message data protection. In this post, we show you how you can use this new capability to create custom data identifiers to detect and protect domain-specific sensitive data, such as your company’s employee IDs. Previously, you could only use managed data identifiers […]
IAM Roles Anywhere with an external certificate authority
AWS Identity and Access Management Roles Anywhere allows you to use temporary HAQM Web Services (AWS) credentials outside of AWS by using X.509 Certificates issued by your certificate authority (CA). Faraz Angabini goes deep into using IAM Roles Anywhere in his blog post Extend AWS IAM roles to workloads outside of AWS with IAM Roles […]
Securing generative AI: An introduction to the Generative AI Security Scoping Matrix
Generative artificial intelligence (generative AI) has captured the imagination of organizations and is transforming the customer experience in industries of every size across the globe. This leap in AI capability, fueled by multi-billion-parameter large language models (LLMs) and transformer neural networks, has opened the door to new productivity improvements, creative capabilities, and more. As organizations […]
AWS announces Cloud Companion Guide for the CSA Cyber Trust mark
HAQM Web Services (AWS) is excited to announce the release of a new Cloud Companion Guide to help customers prepare for the Cyber Trust mark developed by the Cyber Security Agency of Singapore (CSA). The Cloud Companion Guide to the CSA’s Cyber Trust mark provides guidance and a mapping of AWS services and features to […]
Enable Security Hub partner integrations across your organization
AWS Security Hub offers over 75 third-party partner product integrations, such as Palo Alto Networks Prisma, Prowler, Qualys, Wiz, and more, that you can use to send, receive, or update findings in Security Hub. We recommend that you enable your corresponding Security Hub third-party partner product integrations when you use these partner solutions. By centralizing […]