Building custom frameworks with AWS Audit Manager
Discover how to use automation with AWS SDK for Python (Boto3) to build custom frameworks at scale with examples from customer use cases.
Watch Video
Discover how to use automation with AWS SDK for Python (Boto3) to build custom frameworks at scale with examples from customer use cases.
Watch Video
Learn about the AWS Nitro System and how it provides confidential computing and an isolated execution environment with AWS Nitro Enclaves.
Watch Video
Amazon Macie is a fully managed data security and privacy service that uses machine learning and pattern matching to help you protect your sensitive data on AWS.
Watch Video
We share a mental model for how to get to least privilege in your AWS environment.
Watch Video
In this stream, you’ll learn about different ways to secure your APIs in API Gateway.
Watch Video
With AWS Systems Manager Patch Manager you can automate patching across multiple types of operating systems (OSs), development environments, and software packages.
Watch Video
Uncover services that operationalize your analysts’ ability to correlate large amounts of data across multiple AWS security domains.
Watch Video
Gain expert knowledge into AWS Security Hub custom insights and Amazon GuardDuty filters based on threat intelligence data.
Watch Video
Learn how to extend AWS SSO functionality to fit in with common enterprise identity access and governance use cases within AWS Organizations.
Watch Video
The following procedures show you how to designate a delegated administrator for your AWS organization and add member accounts. Select Console or API and follow the provided steps.
Learn More
The Security Hub administrator account then enables organization accounts as member accounts. They can also invite other accounts to be member accounts.
Learn More
With IAM identity-based policies, you can specify allowed or denied actions and resources as well as the conditions under which actions are allowed or denied.
Learn More
Each of the following policies is an example of a deny list policy strategy. Deny list policies must be attached along with other policies that allow the approved actions in the affected accounts.
Learn More
AWS Security Hub can aggregate security finding data from several AWS services and from supported AWS Partner Network (APN) security solutions.
Learn More
A service-linked role is a unique type of IAM role that is linked to AWS Config. A service-linked role makes setting up AWS Config easier because you don’t have to manually add necessary permissions.
Learn More
This workshop guides you through the features and functions of Security Hub. It will show you how to use Security Hub to import and analyze findings from different data sources to improve security.
Explore Workshop
Two techniques used to write least privilege AWS Identity and Access Management (IAM) policies.
Read Article
IAM Access Analyzer generates policies for you. You can now use IAM Access Analyzer to generate fine-grained policies, based on your access activity in your AWS CloudTrail logs.
Read Article
You can now automatically create and update issues in Atlassian JSM from AWS Security Hub findings. Updates to those issues in Atlassian JSM will be synced with the findings in AWS Security Hub.
Learn More
AWS Security Hub now allows you to designate an aggregation Region and link some or all Regions to that aggregation Region.
Learn More
Loading More...