AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Thinknum-APN Blog-121022-2

Thinknum Gains Valuable Benefits Through the AWS Foundational Technical Review

By undergoing a Foundational Technical Review (FTR), AWS Partners can gain valuable technical and business benefits by addressing important requirements and managing ongoing compliance. Thinknum, an Advanced Tier Services Partner, engaged in the AWS FTR to identify key opportunities for improvement in its AWS account configuration and receive guidance on how to implement improvements to its security, reliability, and operational posture.

6pillars-APN-Blog-120822

Infrastructure Auto-Remediation on AWS with 6pillars and AWS Well-Architected Integration

The AWS Well-Architected Framework defines six pillars of cloud best-practices, and automation has matured to the point where it’s ready to support customers’ growing sophistication and appetite for efficiency. Learn how 6pillars’ dedication to automation-first and integration with AWS-native tools enables customers to deploy automation of AWS best practices quickly, safely, and cost-effectively. This drives significant benefits to customers seeking to adhere to multiple compliance standards.

MOTON-Consulting-APN-Blog-120822

How IAM Health Cloud Helps You Manage AWS IAM Even When You Have Multiple Accounts

IAM Health Cloud is a SaaS solution available in AWS Marketplace that enables continuous and central collection and analysis of all AWS Identity and Access Management (IAM) data for determining a company’s IAM posture across any number of AWS accounts. Learn how to use IAM Health Cloud to gain near real-time centralized insight of all IAM assets across multiple AWS accounts, even if they are independent or part of fragmented AWS Organizations.

ASCENDING-APN-Blog-113022

Data Governance Across AWS Organizations for Security and Compliance

Data governance serves an important role in ensuring the quality, consistency, and security of data utilized across an organization. Using a multi-account structure with cross-account access is an AWS best practice that offers several other benefits. Learn how to set up a data governance system in AWS Organization accounts with clients’ use cases and solutions, and how ASCENDING overcame the technical challenges listed above.

Tetrate-APN-Blog-113022

Automate Istio-Enabled Amazon EKS Cluster Deployment with Tetrate’s EKS Blueprints Add-On

Istio and Envoy have become key technologies in the modern application stack, especially for enterprises adopting Zero Trust security standards for microservices applications. Using standardized tooling from AWS and Tetrate, it’s easier than ever to fully integrate Amazon EKS and Istio into modern, declarative IaC deployment processes. Learn how to use EKS Blueprints with Tetrate’s Istio add-on to stand up fully bootstrapped clusters.

Understand and Prioritize Risk Amplifiers Within Your Cloud with AWS Services and Sonrai Dig

Sonrai Dig is a platform built from the ground up to solve threats to your cloud through early recognition of significant risks, which can prevent the exploitation and monetizing of your data. With one platform, you get contextual integration of investments in AWS, as well as normalization of those same capabilities across multi-cloud deployments. Together, Sonrai Dig, Amazon Inspector, and Amazon GuardDuty complement each other’s ability to find and categorize risk urgency.

Palo-Alto-Networks-APN-Blog-112622-1

Securing the 5G Network on AWS with Palo Alto Networks

Security is job zero at AWS and is one of the most important design principles of a Well-Architected Framework. Learn how to implement a 5G end-to-end security model based on Zero Trust principles using Palo Alto Networks’ 5G-native security solution for highly distributed and cloud-native 5G networks—with containerized 5G security and real-time threat correlation among 5G users, device identifiers, and a 5G network slice.

Orca-Security-APN-Blog-111522

Wix Combines Amazon GuardDuty and Orca Security to Provide Enterprise-Grade Security for Over 230 Million Users

The security team at Wix, a global leader in providing a comprehensive, cloud-based platform for web development, needed to reduce and prioritize the number of alerts and get a deeper dive into their cloud infrastructure stack. They sought to understand issues and vulnerabilities that could possibly be exploited and gain more context pertaining to incidents. Learn how Orca Security and Amazon GuardDuty helped prioritize detected alerts based on the severity of a security issue, its accessibility, and business impact.

DuploCloud-APN-Blog-110122

Provisioning Secure and Compliant Applications on AWS with DevSecOps and DuploCloud

It has become increasingly important for companies to meet security and compliance standards set forth across industries today, but this is particularly a hurdle for smaller ISVs and startups that do not have the resources and budget to navigate the ever-growing list. Learn about an approach and best practices for SOC 2 compliance, and how DuploCloud accelerates time to compliance by natively integrating security controls into mainstream DevOps workflows.

Smarsh-APN-Blog-110122

Keeping Pace with FinServ Regulatory Compliance Demands with Smarsh and AWS

Enterprises require the ability to be proactive on modern governance challenges. The difficulty is knowing what data you have, where it’s located, its business value or risk to the organization, and how it can be protected. The Smarsh Enterprise Platform enables companies to capture, retain, analyze, and act on the “signals” in communications that are most critical to the business. These include compliance and brand risks and may expand to include security threats, cultural indicators, untapped revenue opportunities, and more.