AWS Security Blog

Category: Intermediate (200)

Exclude cipher suites at the API gateway using a Network Load Balancer security policy

Exclude cipher suites at the API gateway using a Network Load Balancer security policy

In this blog post, we will show you how to use HAQM Elastic Load Balancing (ELB)—specifically a Network Load Balancer—to apply a more granular control on the cipher suites that are used between clients and servers when establishing an SSL/TLS connection with HAQM API Gateway. The solution uses virtual private cloud (VPC) endpoints (powered by […]

A walk through AWS Verified Access policies

A walk through AWS Verified Access policies

AWS Verified Access helps improve your organization’s security posture by using security trust providers to grant access to applications. This service grants access to applications only when the user’s identity and the user’s device meet configured security requirements. In this blog post, we will provide an overview of trust providers and policies, then walk through […]

How to scan your AWS Lambda functions with HAQM Inspector

How to scan your AWS Lambda functions with HAQM Inspector

HAQM Inspector is a vulnerability management and application security service that helps improve the security of your workloads. It automatically scans applications for vulnerabilities and provides you with a detailed list of security findings, prioritized by their severity level, as well as remediation instructions. In this blog post, we’ll introduce new features from HAQM Inspector […]

Lambda function initiated by EventBridge rule

How to monitor the expiration of SAML identity provider certificates in an HAQM Cognito user pool

With HAQM Cognito user pools, you can configure third-party SAML identity providers (IdPs) so that users can log in by using the IdP credentials. The HAQM Cognito user pool manages the federation and handling of tokens returned by a configured SAML IdP. It uses the public certificate of the SAML IdP to verify the signature […]

HAQM Cognito and AWS WAF diagram

Protect your HAQM Cognito user pool with AWS WAF

September 8, 2023: It’s important to know that if you activate user sign-up in your user pool, anyone on the internet can sign up for an account and sign in to your apps. Don’t enable self-registration in your user pool unless you want to open your app to allow users to sign up. Many of […]

Use IAM roles to connect GitHub Actions to actions in AWS

Use IAM roles to connect GitHub Actions to actions in AWS

May 22, 2023: We updated the post to reflect case sensitivity in the IDP entered: http://token.actions.githubusercontent.com. The IDP created in this post should be entered in lowercase through the post. Have you ever wanted to initiate change in an HAQM Web Services (AWS) account after you update a GitHub repository, or deploy updates in an […]

Exclamation warning

How to prioritize IAM Access Analyzer findings

AWS Identity and Access Management (IAM) Access Analyzer is an important tool in your journey towards least privilege access. You can use IAM Access Analyzer access previews to preview and validate public and cross-account access before deploying permissions changes in your environment. For the permissions already in place, one of IAM Access Analyzer’s capabilities is that […]

ABAC framework to control access to secrets using IAM Identity Center

Scale your authorization needs for Secrets Manager using ABAC with IAM Identity Center

With AWS Secrets Manager, you can securely store, manage, retrieve, and rotate the secrets required for your applications and services running on AWS. A secret can be a password, API key, OAuth token, or other type of credential used for authentication purposes. You can control access to secrets in Secrets Manager by using AWS Identity […]

Investigate security events by using AWS CloudTrail Lake advanced queries

This blog post shows you how to use AWS CloudTrail Lake capabilities to investigate CloudTrail activity across AWS Organizations in response to a security incident scenario. We will walk you through two security-related scenarios while we investigate CloudTrail activity. The method described in this post will help you with the investigation process, allowing you to […]

Reduce triage time for security investigations with HAQM Detective visualizations and export data

To respond to emerging threats, you will often need to sort through large datasets rapidly to prioritize security findings. HAQM Detective recently released two new features to help you do this. New visualizations in Detective show the connections between entities related to multiple HAQM GuardDuty findings, and a new export data feature helps you use […]