AWS Security Blog
Category: Intermediate (200)
Writing IAM Policies: Grant Access to User-Specific Folders in an HAQM S3 Bucket
Mar 25, 2024: We have fixed the JSON code examples which caused errors by replacing the curly quotes with straight quotes. November 14, 2023: We’ve updated this post to use IAM Identity Center and follow updated IAM best practices. In this post, we discuss the concept of folders in HAQM Simple Storage Service (HAQM S3) […]
AWS KMS is now FIPS 140-3 Security Level 3. What does this mean for you?
February 20, 2025: This post was republished to reflect the certification of AWS KMS HSMs under FIPS 140-3 Security Level 3. AWS Key Management Service (AWS KMS) recently announced that its hardware security modules (HSMs) were given Federal Information Processing Standards (FIPS) 140-3 Security Level 3 certification from the U.S. National Institute of Standards and Technology […]
Aggregating, searching, and visualizing log data from distributed sources with HAQM Athena and HAQM QuickSight
Part 1 of a 3-part series Part 2 – How to visualize HAQM Security Lake findings with HAQM QuickSight Part 3 – How to share security telemetry per Organizational Unit using HAQM Security Lake and AWS Lake Formation Customers using HAQM Web Services (AWS) can use a range of native and third-party tools to build […]
How to visualize HAQM Security Lake findings with HAQM QuickSight
Part 2 of a 3-part series Part 1 – Aggregating, searching, and visualizing log data from distributed sources with HAQM Athena and HAQM QuickSight Part 3 – How to share security telemetry per Organizational Unit using HAQM Security Lake and AWS Lake Formation In this post, we expand on the earlier blog post Ingest, transform, […]
Refine permissions for externally accessible roles using IAM Access Analyzer and IAM action last accessed
When you build on HAQM Web Services (AWS) across accounts, you might use an AWS Identity and Access Management (IAM) role to allow an authenticated identity from outside your account—such as an IAM entity or a user from an external identity provider—to access the resources in your account. IAM roles have two types of policies […]
Security considerations for running containers on HAQM ECS
January 11, 2024: We’ve updated this post to include information about HAQM GuardDuty Runtime Monitoring for HAQM ECS clusters. If you’re looking to enhance the security of your containers on HAQM Elastic Container Service (HAQM ECS), you can begin with the six tips that we’ll cover in this blog post. These curated best practices are […]
Transforming transactions: Streamlining PCI compliance using AWS serverless architecture
Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is critical for organizations that handle cardholder data. Achieving and maintaining PCI DSS compliance can be a complex and challenging endeavor. Serverless technology has transformed application development, offering agility, performance, cost, and security. In this blog post, we examine the benefits of using AWS […]
Prepare your AWS workloads for the “Operational risks and resilience – banks” FINMA Circular
In December 2022, FINMA, the Swiss Financial Market Supervisory Authority, announced a fully revised circular called Operational risks and resilience – banks that will take effect on January 1, 2024. The circular will replace the Swiss Bankers Association’s Recommendations for Business Continuity Management (BCM), which is currently recognized as a minimum standard. The new circular […]
Scaling national identity schemes with itsme and HAQM Cognito
In this post, we demonstrate how you can use identity federation and integration between the identity provider itsme® and HAQM Cognito to quickly consume and build digital services for citizens on HAQM Web Services (AWS) using available national digital identities. We also provide code examples and integration proofs of concept to get you started quickly. […]
Evolving cyber threats demand new security approaches – The benefits of a unified and global IT/OT SOC
In this blog post, we discuss some of the benefits and considerations organizations should think through when looking at a unified and global information technology and operational technology (IT/OT) security operations center (SOC). Although this post focuses on the IT/OT convergence within the SOC, you can use the concepts and ideas discussed here when thinking […]