AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Streamlining Kubernetes Certificate Management with Amazon EKS and AppViewX KUBE+

Kubernetes simplifies application deployment but introduces certificate management challenges. Amazon EKS is a managed Kubernetes service that automates security patching, while AppViewX KUBE+ automates certificate lifecycle management across the Kubernetes environment. By integrating AppViewX KUBE+ with EKS, organizations gain robust automation, DevOps and security alignment, operational efficiency, and agility for secure cloud-native operations.

Nirmata-APN-Blog-032924

How to Enable Secure Self-Service Amazon EKS Cluster Provisioning with ArgoCD, Kyverno, and Nirmata Policy Manager

Containers are a leading method for packaging applications, with Kubernetes emerging as the top orchestration solution. You can enable secure and efficient self-service cluster provisioning on Amazon EKS using open-source tools like AWS Controllers for Kubernetes (ACK), Kyverno, and ArgoCD. This post demonstrates how enterprises can leverage these tools along with Nirmata’s Policy Manager to streamline EKS cluster management, apply security policies, and ensure compliance in a Kubernetes environment.

Migrate Sensitive Digital Assets to AWS with Eviden Data Sovereignty Solutions

Many European customers face data sovereignty challenges due to regulations and want to adopt cloud while meeting requirements around data location, autonomy, and resilience. Eviden’s advisory services help define a tailored sovereignty framework. Its implementation services with AWS enforce technical, operational, and organizational compliance. Eviden guides customers’ full cloud journey adhering to their sovereignty needs leveraging AWS services.

New-Relic-APN-Blog-032624

Using Amazon Security Lake with New Relic for Threat Detection and Incident Response

Amazon Security Lake centralizes security data from multiple AWS sources into a customer-owned data lake. A New Relic integration provides a single pane for performance and security telemetry, ingests Amazon Security Lake data, and allows threat detection via curated dashboards and anomaly alerts. This solution improves cloud security posture by consolidating data, providing insights, and enabling automated response to potential threats.

Building a Scalable DICOM Ingestion Pipeline for AWS HealthImaging with CitiusTech

AWS HealthImaging is a new HIPAA-eligible service for storing, analyzing, and sharing medical imaging data securely in the cloud. CitiusTech developed a solution leveraging AWS services like HealthImaging to automate ingesting DICOM data. It scans for malware, validates DICOM files, copies clean images to HealthImaging for storage, and notifies users. Healthcare providers can easily migrate imaging workloads to realize improved accessibility and cost-efficiency.

Enhancing Workload Security on AWS with Zscaler Zero Trust Exchange

As organizations move to the cloud, securing workloads, applications, and data becomes critical. This post discusses using Zscaler Zero Trust Exchange to provide comprehensive cloud security. Key security capabilities highlighted include SSL inspection, data loss prevention, and URL filtering policies tailored for cloud workloads. The post provides guidance on design considerations and implementing baseline security policies within the Zscaler platform.

How to Shift Left Security in Infrastructure as Code Using AWS CDK and Checkmarx KICS

Integrating security scanning into infrastructure as code (IaC) allows detecting misconfigurations early in development. This post explores using the KICS plugin from Checkmarx with AWS CDK. Learn how KICS performs static code analysis to find vulnerabilities and compliance issues in IaC and scans the CDK code to report findings, failing the command for high-severity issues. This shifts security left, mitigating risks in deployed infrastructure.

How Accenture Accelerates Building a Secure Cloud Foundation Natively on AWS

Enterprise cloud adoption enables scalability but can introduce security and compliance challenges from decentralized builders and disparate growth. Accenture’s Secure Cloud Foundation on AWS provides a well-defined, automated account provisioning process with guardrails to enable secure and streamlined self-service innovation across teams. It establishes robust cloud foundations to automate security and break organizational barriers for accountability and outcomes.

Orca-Security-APN-Blog-022424

6 Steps Towards Achieving FedRAMP Authorization on AWS with Orca Security

Achieving FedRAMP authorization is critical for cloud service providers serving government agencies. Orca Security’s cloud-native platform on AWS provides comprehensive coverage to help companies navigate the complexities of FedRAMP. By determining impact levels, deploying in FedRAMP-compliant AWS regions, leveraging approved services, implementing security controls, preparing for authorization, and enabling continuous monitoring, Orca and AWS streamline the journey to FedRAMP compliance.

Managing an Enterprise Backup Strategy with AWS Backup and CloudQuery

AWS Backup simplifies policy-based data protection at scale, and observability offers insights into the backup process for monitoring, issue detection, troubleshooting, and optimization. This ensures backup dependability, efficiency, and security. CloudQuery enables managing and visualizing AWS Backup across accounts, including backup health, configuration, and protected resources to facilitate building a robust compliance posture.