AWS Partner Network (APN) Blog
Category: Security, Identity, & Compliance
Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub
To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.
Just in Time Elevated Access to AWS with CyberArk Privilege Access Management
Just in Time (JIT) access helps organizations provision access so users can only access privileged accounts and resources when they need it. This post explains how integrating CyberArk Privilege Access Management (PAM) with AWS can reduce the risk associated with long-standing privilege access or “always on” access to the AWS Cloud environment. With PAM and AWS, each user expecting to make privileged API calls will have to seek approvals with proper justification before temporary privileged access can be granted.
Enhancing Security for AWS Lambda Functions with Fastly’s Next-Gen WAF
An integral component to most serverless architectures is AWS Lambda, the compute service that lets you run code for virtually any type of application without provisioning or managing servers. Fastly has extended its Next-Gen WAF to Lambda functions, supporting customers looking to embed additional layers of security into their serverless workloads. Fastly’s Next-Gen WAF supports numerous other deployment scenarios including virtual machines, containers, and web servers.
Simplify and Secure Terraform Workflows on AWS with Dynamic Provider Credentials
The HashiCorp Terraform AWS provider has surpassed more than one billion downloads, and every single Terraform apply starts with a provider credentials setup. The new dynamic provider credentials feature offers the ability to generate dynamic, short-lived credentials for Terraform Cloud runs using OIDC. This feature is now available for all Terraform Cloud tiers. Terraform Cloud is HashiCorp’s managed service offering and eliminates the heavy lifting for practitioners, teams, and organizations to use Terraform in production.
How LTIMindtree Solves for Cross-Account Sensitive Data Sharing Using AWS Services
Organizations have a requirement to implement data governance due to the presence of personally identifiable information. The process of sharing and operationalizing data movement becomes an involved task, as it must encompass data governance, data security, and include audit capabilities. Learn about a modern process LTIMindtree has introduced for data transfer using AWS Step Functions and for sharing transformed data to another account regardless of regional location.
How Metal Toad Uses Machine Learning to Keep a Top Comic Site Safe for San Diego Comic-Con
Metal Toad has been working with major entertainment brands for decades, including keeping some of the highest-profile media sites live under unique traffic conditions. Keeping these sites up and running is one of Metal Toad’s superpowers, but the AWS Digital Customer Experience Competency Partner couldn’t do it without the tools provided by AWS. Explore some of the strategies Metal Toad deployed to protect a customer’s site during an event where failure was not an option.
Bringing Scale to Zero Trust Network Access with CylanceGATEWAY Using AWS Global Accelerator
Zero trust security is about achieving continuous security without slowing or complicating workflows, and BlackBerry’s collaboration with AWS unlocks the benefits of this approach for organizations of any size. Scale, simplicity, and security are important factors to an effective Zero Trust Network Access (ZTNA) platform. Learn how CylanceGATEWAY, an innovative ZTNA solution powered by AWS Global Accelerator that replaces traditional VPN technologies, brings this ideal state to reality.
Securing Your Infrastructure as Code Deployments with AWS and Snyk
When you combine AWS CodeBuild with Snyk to deploy your infrastructure as code project, you gain a repeatable process that’s easy to track and manage that happens to include security results. AWS provides the automation while Snyk provides enhanced security. Learn how to manage an IaC project written with Terraform by HashiCorp and deployed with AWS CodeBuild, and review results before a scan and after when hidden issues are often revealed.
How HUMAN Advertising Intelligence Solutions Help Protect Against Ad Fraud in the Ad Tech Industry
HUMAN is a cybersecurity company that safeguards brands from incidents including bots, fraud, and account abuse. It specializes in modern defense by disrupting the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective protection. Learn how HUMAN on AWS verifies the humanity of more than 20 trillion digital interactions per week across advertising, marketing, ecommerce, government, education, and enterprise security.
Automate Your Cloud Storage Security with AWS and IBC S6 from Ionburst
Ionburst in an AWS Partner that was founded in 2018 on the underlying principle that data privacy is a human right. Its mission is to provide data privacy as part of the cloud, not only as a default posture but as the only posture. Learn how Ionburst Cloud’s private-by-default storage solution, called IBC S6 (Simple Secure Sovereign Scalable Storage Service), is helping customers take advantage of Amazon S3 whilst reducing risk due to misconfiguration or malice.