AWS Security Blog
Tag: Compliance
How US federal agencies can use AWS to improve logging and log retention
September 9, 2021: HAQM Elasticsearch Service has been renamed to HAQM OpenSearch Service. See details. This post is part of a series about how HAQM Web Services (AWS) can help your US federal agency meet the requirements of the President’s Executive Order on Improving the Nation’s Cybersecurity. You will learn how you can use AWS […]
Spring 2021 PCI DSS report now available with nine services added in scope
We’re continuing to expand the scope of our assurance programs at HAQM Web Services (AWS) and are pleased to announce that nine new services have been added to the scope of our Payment Card Industry Data Security Standard (PCI DSS) certification. This provides our customers with more options to process and store their payment card […]
AWS Verified episode 6: A conversation with Reeny Sondhi of Autodesk
I’m happy to share the latest episode of AWS Verified, where we bring you global conversations with leaders about issues impacting cybersecurity, privacy, and the cloud. We take this opportunity to meet with leaders from various backgrounds in security, technology, and leadership. For our latest episode of Verified, I had the opportunity to meet virtually […]
Approaches to meeting Australian Government gateway requirements on AWS
November 24, 2021: This post has been updated to reflect the change in hyperlinks like Guidelines for Gateways. Australian Commonwealth Government agencies are subject to specific requirements set by the Protective Security Policy Framework (PSPF) for securing connectivity between systems that are running sensitive workloads, and for accessing less trusted environments, such as the internet. […]
How to confirm your automated HAQM EBS snapshots are still created after the TLS 1.2 uplift on AWS FIPS endpoints
We are happy to announce that all AWS Federal Information Processing Standard (FIPS) endpoints have been updated to only accept a minimum of Transport Layer Security (TLS) 1.2 connections. This ensures that our customers who run regulated workloads can meet FedRAMP compliance requirements that mandate a minimum of TLS 1.2 encryption for data in transit. Attempts […]
Fall 2020 PCI DSS report now available with eight additional services in scope
We continue to expand the scope of our assurance programs and are pleased to announce that eight additional services have been added to the scope of our Payment Card Industry Data Security Standard (PCI DSS) certification. This gives our customers more options to process and store their payment card data and architect their cardholder data […]
re:Invent – New security sessions launching soon
Where did the last month go? Were you able to catch all of the sessions in the Security, Identity, and Compliance track you hoped to see at AWS re:Invent? If you missed any, don’t worry—you can stream all the sessions released in 2020 via the AWS re:Invent website. Additionally, we’re starting 2021 with all new […]
Deploy an automated ChatOps solution for remediating HAQM Macie findings
The amount of data being collected, stored, and processed by HAQM Web Services (AWS) customers is growing at an exponential rate. In order to keep pace with this growth, customers are turning to scalable cloud storage services like HAQM Simple Storage Service (HAQM S3) to build data lakes at the petabyte scale. Customers are looking […]
Three common cloud encryption questions and their answers on AWS
August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. At HAQM Web Services (AWS), we encourage our customers to take advantage of encryption to […]
Set up centralized monitoring for DDoS events and auto-remediate noncompliant resources
When you build applications on HAQM Web Services (AWS), it’s a common security practice to isolate production resources from non-production resources by logically grouping them into functional units or organizational units. There are many benefits to this approach, such as making it easier to implement the principal of least privilege, or reducing the scope of […]