AWS Partner Network (APN) Blog
AWS Security Competency Adds DSPM and TEAM Use Cases for ISV Partners
In today’s fast-evolving digital landscape, security remains a concern for organizations of all sizes. As the threat landscape evolves, so do the solutions that address these challenges. The AWS Security Competency for ISVs aligns partner cyber security offerings to the needs of AWS customers, which is why the program now includes the “Data Security Posture Management” use case in the Data Protection category, and the “Temporary Elevated Access Management” use case in the Identity and Access Management category.
Risk-Based, Fine-Grained Authorization with Transmit Security and Amazon Verified Permissions
Managing and securing account access can feel like navigating a complex landmine of risk. Learn how to take a risk score calculated by Transmit Security and use it as an input to an authorization decision made by Amazon Verified Permissions, which delivers a pre-built system that simplifies policy-based access control and is flexible enough to address the most advanced authorization requirements for custom applications. With granular policies, it’s highly effective for determining who has access to what.
Applying Fine-Grained Authorization to Legacy Apps with Strata Identity Orchestration and Amazon Verified Permissions
Achieving a zero-trust architecture is a top priority for many organizations, and a big part is externalizing authorization to ensure least privilege access for all applications. Amazon Verified Permissions is a fine-grained authorization service for developers building custom applications. Learn how Strata Identity’s Maverics Identity Orchestration platform allows you to simplify cloud migration and modernization projects by augmenting your datasets to ensure comprehensive policy enforcement.


