AWS Security Blog
Tag: Cloud security
Canadian Centre for Cyber Security Assessment Summary report now available in AWS Artifact
French version At HAQM Web Services (AWS), we are committed to providing continued assurance to our customers through assessments, certifications, and attestations that support the adoption of AWS services. We are pleased to announce the availability of the Canadian Centre for Cyber Security (CCCS) assessment summary report for AWS, which you can view and download […]
AWS Verified episode 5: A conversation with Eric Rosenbach of Harvard University’s Belfer Center
I am pleased to share the latest episode of AWS Verified, where we bring you conversations with global cybersecurity leaders about important issues, such as how to create a culture of security, cyber resiliency, Zero Trust, and other emerging security trends. Recently, I got the opportunity to experience distance learning when I took the AWS […]
Nine additional AWS cloud service offerings authorized by DISA
September 9, 2021: HAQM Elasticsearch Service has been renamed to HAQM OpenSearch Service. See details. I’m excited to share that the Defense Information Systems Agency (DISA) has authorized three additional HAQM Web Services (AWS) services at Impact Level (IL) 4 and IL 5 in the AWS GovCloud (US) Regions, as well as five additional AWS […]
AWS Verified, episode 4: How Lockheed Martin embeds security
Last year HAQM Web Services (AWS) launched a new video series, AWS Verified, where we talk to global cybersecurity leaders about important issues, such as how the pandemic is impacting cloud security, how to create a culture of security, and emerging security trends. Today I’m happy to share the latest episode of AWS Verified, an […]
How to replicate secrets in AWS Secrets Manager to multiple Regions
On March 3, 2021, we launched a new feature for AWS Secrets Manager that makes it possible for you to replicate secrets across multiple AWS Regions. You can give your multi-Region applications access to replicated secrets in the required Regions and rely on Secrets Manager to keep the replicas in sync with the primary secret. […]
How to set up a recurring Security Hub summary email
January 13, 2025: This post was updated to include code to create Security Hub custom insights through the use of CloudFormation. AWS Security Hub provides a comprehensive view of your security posture in HAQM Web Services (AWS) and helps you check your environment against security standards and best practices. In this post, we’ll show you […]
Use Macie to discover sensitive data as part of automated data pipelines
Data is a crucial part of every business and is used for strategic decision making at all levels of an organization. To extract value from their data more quickly, HAQM Web Services (AWS) customers are building automated data pipelines—from data ingestion to transformation and analytics. As part of this process, my customers often ask how […]
Verified episode 2: A conversation with Emma Smith, Director of Global Cyber Security at Vodafone
Over the past 8 months, it’s become more important for us all to stay in contact with peers around the globe. Today, I’m proud to bring you the second episode of our new video series, Verified: Presented by AWS re:Inforce. Even though we couldn’t be together this year at re:Inforce, our annual security conference, we […]
Introducing the first video in our new series, Verified, featuring Netflix’s Jason Chan
The year has been a profoundly different one for us all, and like many of you, I’ve been adjusting, both professionally and personally, to this “new normal.” Here at AWS we’ve seen an increase in customers looking for secure solutions to maintain productivity in an increased work-from-home world. We’ve also seen an uptick in requests […]
How Security Operation Centers can use HAQM GuardDuty to detect malicious behavior
The Security Operations Center (SOC) has a tough job. As customers modernize and shift to cloud architectures, the ability to monitor, detect, and respond to risks poses different challenges. In this post we address how HAQM GuardDuty can address some common concerns of the SOC regarding the number of security tools and the overhead to […]