Blog/Web Assets: Security
-
Building custom frameworks with AWS Audit Manager
Discover how to use automation with AWS SDK for Python (Boto3) to build custom frameworks at scale with examples from customer use cases.
-
Confidential Computing on AWS: the AWS Nitro System and AWS Nitro Enclaves
Learn about the AWS Nitro System and how it provides confidential computing and an isolated execution environment with AWS Nitro Enclaves.
-
Automation workflows with Amazon Macie
Amazon Macie is a fully managed data security and privacy service that uses machine learning and pattern matching to help you protect your sensitive data on AWS.
-
The journey to least privilege on AWS
We share a mental model for how to get to least privilege in your AWS environment.
-
Secure your APIs in API Gateway
In this stream, you’ll learn about different ways to secure your APIs in API Gateway.
-
Builders patching at scale: It doesn't have to be hard
With AWS Systems Manager Patch Manager you can automate patching across multiple types of operating systems (OSs), development environments, and software packages.
-
Security coffee: Keep your analysts on top of their game
Uncover services that operationalize your analysts’ ability to correlate large amounts of data across multiple AWS security domains.
-
Detecting ransomware with AWS security services
Gain expert knowledge into AWS Security Hub custom insights and Amazon GuardDuty filters based on threat intelligence data.
-
Scaling access management for enterprise customers
Learn how to extend AWS SSO functionality to fit in with common enterprise identity access and governance use cases within AWS Organizations.
-
Designating a GuardDuty Delegated Administrator
The following procedures show you how to designate a delegated administrator for your AWS organization and add member accounts. Select Console or API and follow the provided steps.
-
Designating a Security Hub Administrator Account
The Security Hub administrator account then enables organization accounts as member accounts. They can also invite other accounts to be member accounts.
-
How AWS Security Hub works with IAM
With IAM identity-based policies, you can specify allowed or denied actions and resources as well as the conditions under which actions are allowed or denied.
-
Example Service Control Policies
Each of the following policies is an example of a deny list policy strategy. Deny list policies must be attached along with other policies that allow the approved actions in the affected accounts.
-
Product Integrations in AWS Security Hub
AWS Security Hub can aggregate security finding data from several AWS services and from supported AWS Partner Network (APN) security solutions.
-
Using Service-Linked Roles for AWS Config
A service-linked role is a unique type of IAM role that is linked to AWS Config. A service-linked role makes setting up AWS Config easier because you don’t have to manually add necessary permissions.
-
Security Hub Workshop
This workshop guides you through the features and functions of Security Hub. It will show you how to use Security Hub to import and analyze findings from different data sources to improve security.
-
Techniques for Writing Least Privilege IAM Policies
Two techniques used to write least privilege AWS Identity and Access Management (IAM) policies.
-
IAM Access Analyzer Makes it Easier to Implement Least Privilege Permissions
IAM Access Analyzer generates policies for you. You can now use IAM Access Analyzer to generate fine-grained policies, based on your access activity in your AWS CloudTrail logs.
-
AWS Security Hub Supports Bidirectional Integration with Atlassian Jira Service Management
You can now automatically create and update issues in Atlassian JSM from AWS Security Hub findings. Updates to those issues in Atlassian JSM will be synced with the findings in AWS Security Hub.
-
AWS Security Hub Adds Support for Cross-Region Aggregation of Findings
AWS Security Hub now allows you to designate an aggregation Region and link some or all Regions to that aggregation Region.
-
Loading More...