Best Practices for Security, Identity, & Compliance

Cybersecurity Awareness Training

Help employees in your organization learn how to identify cybersecurity risks, including phishing, social engineering, and data privacy with this free, 15-minute training from Amazon. The training is offered in 11 languages, is compliant with the Web Content Accessibility Guidelines (WCAG) 2.1 AA, and includes completion certificates for compliance tracking. Deploy immediately from our website or implement our pre-packaged files in your organization’s LMS.

Learn more »

Slide with the title "Generative AI for security in the real world," presented by Brad Dispensa and Matt Saner from AWS. A vibrant, curved gradient design is at the bottom.

AWS re:Invent 2024: Generative AI for security in the real world (56:17)

Slide with the title "Building a resilient and effective culture of security," presented by Kristen Haught, Brigid Johnson, and Bill Shinn from AWS. A curved gradient design is at the bottom.

AWS re:Invent 2024: Building a resilient and effective culture of security (1:02:34)

Slide with the title "How to maintain and automate compliance on AWS," presented by Laura Verghote and Cristina Rios Iribarren from AWS. A vibrant, curved gradient design is at the bottom.

AWS re:Invent 2024: How to maintain and automate compliance on AWS (36:32)

Filter by:
Content Type
Methodology
1-6 (345)
Showing results: 1-6
Total results: 345
  • Date (Desc)

No results found. 
Please select different criteria, check your spelling, or try different keywords.

  • Guide

    New

    AWS KMS best practices

    Learn best practices for using AWS Key Management Service, including strategies for key management, data protection, access control, monitoring, and cost optimization.

    HTML | PDF

    Tags: Cloud foundations | Security

    March 24, 2025
  • Pattern

    New

    Automate AWS infrastructure operations

    Use Amazon Bedrock to help automate your AWS infrastructure operations such as Amazon EC2 instance management, Amazon S3 lifecycle policies, and Amazon RDS backup automation.

    HTML | PDF

    Tags: Cloud Financial Management | DevOps | Machine Learning

    March 24, 2025
  • Pattern

    Updated

    Implement SHA1 hashing in PostgreSQL

    Implement SHA1 hashing and BigInt conversion for email addresses in PostgreSQL, replicating functionality from SQL Server and .NET applications.

    HTML | PDF

    Tags: Databases | Migration | Security | Serverless

    March 24, 2025
  • Pattern

    New

    Automate account creation using the Landing Zone Accelerator on AWS

    Use the Landing Zone Accelerator on AWS solution to automatically deploy a new account when an authorized user submits a request.

    HTML | PDF

    Tags: Cloud foundations | DevOps | Infrastructure | Management & Governance

    March 14, 2025
  • Guide

    New

    Choosing an AWS vector database for RAG use cases

    Choose a vector database that helps to optimize the performance and efficiency of your RAG solution.

    HTML | PDF

    Tags: Analytics | Machine Learning | Websites & Web Apps

    March 06, 2025
  • Strategy

    Updated

    Deciding to adopt an AWS security service

    Use a decision tree to confidently choose whether to adopt an AWS security service.

    HTML | PDF

    Tags: Security

    February 27, 2025
1 58

Security, Identity, & Compliance Blog Posts

Showing results: 1-6
Total results: 3707
No blog posts found that match the selected criteria.
More…

Was this page helpful?