Blog/Web Assets: Security

  • Building custom frameworks with AWS Audit Manager

    Building custom frameworks with AWS Audit Manager

    Discover how to use automation with AWS SDK for Python (Boto3) to build custom frameworks at scale with examples from customer use cases.

    Watch Video
  • Confidential Computing on AWS: the AWS Nitro System and AWS Nitro Enclaves

    Confidential Computing on AWS: the AWS Nitro System and AWS Nitro Enclaves

    Learn about the AWS Nitro System and how it provides confidential computing and an isolated execution environment with AWS Nitro Enclaves.

    Watch Video
  • Automation workflows with Amazon Macie

    Automation workflows with Amazon Macie

    Amazon Macie is a fully managed data security and privacy service that uses machine learning and pattern matching to help you protect your sensitive data on AWS.

    Watch Video
  • The journey to least privilege on AWS

    The journey to least privilege on AWS

    We share a mental model for how to get to least privilege in your AWS environment.

    Watch Video
  • Secure your APIs in API Gateway

    Secure your APIs in API Gateway

    In this stream, you’ll learn about different ways to secure your APIs in API Gateway.

    Watch Video
  • Builders patching at scale: It doesn't have to be hard

    Builders patching at scale: It doesn't have to be hard

    With AWS Systems Manager Patch Manager you can automate patching across multiple types of operating systems (OSs), development environments, and software packages.

    Watch Video
  • Security coffee: Keep your analysts on top of their game

    Security coffee: Keep your analysts on top of their game

    Uncover services that operationalize your analysts’ ability to correlate large amounts of data across multiple AWS security domains.

    Watch Video
  • Detecting ransomware with AWS security services

    Detecting ransomware with AWS security services

    Gain expert knowledge into AWS Security Hub custom insights and Amazon GuardDuty filters based on threat intelligence data.

    Watch Video
  • Scaling access management for enterprise customers

    Scaling access management for enterprise customers

    Learn how to extend AWS SSO functionality to fit in with common enterprise identity access and governance use cases within AWS Organizations.

    Watch Video
  • Designating a GuardDuty Delegated Administrator

    Designating a GuardDuty Delegated Administrator

    The following procedures show you how to designate a delegated administrator for your AWS organization and add member accounts. Select Console or API and follow the provided steps.

    Learn More
  • Designating a Security Hub Administrator Account

    Designating a Security Hub Administrator Account

    The Security Hub administrator account then enables organization accounts as member accounts. They can also invite other accounts to be member accounts.

    Learn More
  • How AWS Security Hub works with IAM

    How AWS Security Hub works with IAM

    With IAM identity-based policies, you can specify allowed or denied actions and resources as well as the conditions under which actions are allowed or denied.

    Learn More
  • Example Service Control Policies

    Example Service Control Policies

    Each of the following policies is an example of a deny list policy strategy. Deny list policies must be attached along with other policies that allow the approved actions in the affected accounts.

    Learn More
  • Product Integrations in AWS Security Hub

    Product Integrations in AWS Security Hub

    AWS Security Hub can aggregate security finding data from several AWS services and from supported AWS Partner Network (APN) security solutions.

    Learn More
  • Using Service-Linked Roles for AWS Config

    Using Service-Linked Roles for AWS Config

    A service-linked role is a unique type of IAM role that is linked to AWS Config. A service-linked role makes setting up AWS Config easier because you don’t have to manually add necessary permissions.

    Learn More
  • Security Hub Workshop

    Security Hub Workshop

    This workshop guides you through the features and functions of Security Hub. It will show you how to use Security Hub to import and analyze findings from different data sources to improve security.

    Explore Workshop
  • Techniques for Writing Least Privilege IAM Policies

    Techniques for Writing Least Privilege IAM Policies

    Two techniques used to write least privilege AWS Identity and Access Management (IAM) policies.

    Read Article
  • IAM Access Analyzer Makes it Easier to Implement Least Privilege Permissions

    IAM Access Analyzer Makes it Easier to Implement Least Privilege Permissions

    IAM Access Analyzer generates policies for you. You can now use IAM Access Analyzer to generate fine-grained policies, based on your access activity in your AWS CloudTrail logs.

    Read Article
  • AWS Security Hub Supports Bidirectional Integration with Atlassian Jira Service Management

    AWS Security Hub Supports Bidirectional Integration with Atlassian Jira Service Management

    You can now automatically create and update issues in Atlassian JSM from AWS Security Hub findings. Updates to those issues in Atlassian JSM will be synced with the findings in AWS Security Hub.

    Learn More
  • AWS Security Hub Adds Support for Cross-Region Aggregation of Findings

    AWS Security Hub Adds Support for Cross-Region Aggregation of Findings

    AWS Security Hub now allows you to designate an aggregation Region and link some or all Regions to that aggregation Region.

    Learn More
  • loading
    Loading More...