AWS Partner Network (APN) Blog

Category: Advanced (300)

Data Ingestion in a Multi-Tenant SaaS Environment Using AWS Services

AWS experts break down how you can build a multi-tenant data ingestion and processing engine using AWS services. We examine each component of this data pipeline and examine some of the key considerations that can influence how you approach designing a SaaS multi-tenant data ingestion process. We also explore how multi-tenant streaming data can be ingested, transformed, and stored using AWS services while ensuring there are constructs built in to the pipeline to ensure secure processing of the data.

Successive-Cloud-APN-Blog-081523.1

Updating AWS CloudFormation Stacks Without Service Disruption to Support Rapid Business Innovation

Developers can rely on AWS CloudFormation to update or add new resources to an application, as CloudFormation provides two methods for updating the stack: direct update or change set. Learn how to update the value and add new resources to your running Amazon RDS deployment, and explore architecture diagrams to help you see how the system behaves when you apply the changes via CloudFormation template.

GitLab-APN-Blog-082023

Setting Up OpenID Connect with GitLab CI/CD to Provide Secure Access to Environments in AWS Accounts

When building out a CI/CD pipeline, there are ways to proactively harden your pipelines when they need to access environments in AWS accounts. Given that your pipeline will have create and destroy access to critical components of your AWS-based environments, it’s important to evaluate how GitLab Runner authenticates and authorizes for access to your AWS accounts. Learn how the new OpenID Connect (OIDC) for GitLab CI/CD jobs can help you access AWS services using GitLab.

Veeam-APN-Blog-081523

Integrating Kasten K10 with Amazon GuardDuty for Security Monitoring

Kasten K10 by Veeam makes backing up and restoring data easy in the event of a security breach or unintended or unauthorized data manipulation. K10’s cloud-native philosophy inherently makes it easy to integrate into security monitoring systems without much effort. Learn about the Kubernetes Audit and how Kasten K10 natively integrates with it, and explore how to configure Amazon GuardDuty and find K10 events in Amazon CloudWatch logs which GuardDuty pulls from.

Best Practices from Pragma for Navigating the API Economy with Observability and AWS

The term “API economy” refers to businesses delivering digital services to end users, other company services, or partners. This post discusses the necessary aspects to achieve an observability model in the API economy, including a practice example with an architecture design and related technologies. Based on Pragma’s extensive experience, explore the mainstays of observability and the importance of having well-defined observability architecture to have a thriving API economy model at scale.

Bosch-APN-Blog-081123

Build and Deploy Secure AI Applications with AIShield and Amazon SageMaker

Adversarial machine learning (AML) attacks, also known as “artificial intelligence attacks” (AI attacks), involve deliberate attempts to manipulate or compromise machine learning models or even make it reveal sensitive information. Explore how AIShield‘s seamless integration within the Amazon SageMaker environment alleviates AI security concerns by mitigating risks before and after deployment, enabling customers to develop and deploy AI applications with confidence.

Building a Secure, Reliable, and Scalable Chainlink Environment on AWS

A prominent blockchain technology provider sought TrackIt‘s assistance in deploying a scalable Chainlink environment on AWS. Learn how TrackIt leveraged a comprehensive suite of AWS services to implement a customized Chainlink workflow, and explore the steps required to deploy a secure, reliable, and scalable Chainlink environment on AWS. Chainlink is a decentralized blockchain oracle network built on Ethereum designed to facilitate the transfer of tamper-proof data from off-chain sources to on-chain smart contracts.

Privacera-APN-Blog-080423

Governing Databricks Data Access with AWS Lake Formation and Privacera

Many organizations have standardized or plan to standardize their unified data security governance on AWS Lake Formation. Some of these organizations are also leveraging Databricks and would like to create and manage data access policies for Databricks using AWS Lake Formation as well. Learn how Privacera’s integrated solution extends AWS Lake Formation source support to Databricks and provides data access policy authorship and maintenance from one safe and convenient location.

Managing AWS Account Root MFA Using CyberArk Privileged Access Manager

Protecting AWS account root users with multi-factor authentication (MFA) is a crucial security control, and now you can use CyberArk’s Privileged Access Manager (PAM) to securely manage the AWS account root and authenticate its use with MFA. We’ll review the current MFA features for AWS account root user, provide a step-by-step walkthrough of how to install and configure CyberArk PAM to manage root accounts with MFA, and show how to sign into the AWS root account with CyberArk PAM.

Amazon CloudWatch Monitoring for Workloads Hosted on VMware Cloud on AWS

Monitoring and managing cloud-based resources is crucial for maintaining performance, troubleshooting issues, and ensuring the health of your infrastructure. Learn about the integration of Amazon CloudWatch with VMware Cloud on AWS with a focus on monitoring the workload of virtual machines. We’ll elaborate on the benefits of integrating CloudWatch with other AWS services as well as third-party services like ServiceNow ITSM tool and IBM Netcool.