AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Heimdall Data-APN-Blog-090622

Active Directory Authentication and Authorization with Amazon RDS

Learn how to set up Active Directory authentication with authorization for Postgres. Heimdall Data provides synchronization scripts for other databases as well, allowing all Amazon RDS instance types to be supported in a similar way. Using Active Directory authentication allows organizations to standardize their password and authorization management via a globally available authentication store, reducing management overhead and improving security and auditing capabilities.

Apexon-APN-Blog-083022

Data De-Identification in Healthcare: A 360-Degree View from Apexon

In the healthcare industry, the exchange of data incurs risks as it contains personally identifiable information (PII) and protected health information (PHI). At the same time, not exchanging the data can keep valuable insights hidden. Apexon’s data anonymization and de-identification solution uses sophisticated machine learning algorithms to ensure the exchange of data happens without any risk of PII/PHI being exposed, while allowing organizations to meet compliance and regulatory requirements.

Implementing Zero-Trust Workload Security on Amazon EKS with Calico

Amazon EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.

Deloitte-APN-Blog-072622

Managing Cybersecurity Risks with the Next Generation of Managed Security Services  

Both AWS and Deloitte understand that a customer’s cloud journey is different and have their own set of requirements. This is why Deloitte’s Cyber CMS solution provides a wide range of options for businesses to choose from to create the right package for them. Learn how Cyber CMS can help organizations become more trustworthy, resilient, and secure through proactive management of cyber risks.

Level-1-MSSP-Competency-Categories-1

Introducing AWS Level 1 MSSP Competency Specialization Categories

The AWS Level 1 MSSP Competency makes it easy for customers to quickly find validated solution providers qualified to deliver solutions that have been uniquely designed for cloud environments. We are excited to announce specialization categories for the AWS Level 1 MSSP Competency. These categories help customers find the ideal solution provider based on the specific managed security need they are facing. We invite you to explore the following Level 1 MSSP Partner offerings recommended by AWS.

AWS-Security-Competency-Categories-1

Introducing New Categories of AWS Security Competency Partners

The security landscape continues to evolve, making it a challenge for customers to modernize and stay up to date with use cases and threats. We are excited to expand the AWS Security Competency with eight new categories to help customers find and acquire a range of partner services and software, all of which are validated by AWS and address a full suite of security use cases. To keep up with the fast pace of the security marketplace, these categories will expand over time with additional use cases.

DataMasque-APN-Blog-071222

How to Mask Sensitive Data on AWS Using DataMasque

DataMasque is an AWS Partner that removes sensitive data from the databases and replaces it with realistic and functional masked values that enable effective development, testing, and analytics. This empowers AWS customers to do secure deployments in testing or non-production environments while mitigating the data breach security risks and allowing relevant teams to focus on development and testing of their applications without hinderance.

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

T-Systems-APN-Blog-062722

Securing AWS Accounts with Azure Active Directory Federation

With AWS Identity and Access Management (IAM), AWS provides a central way to manage user identities and permissions. However, creating and managing the lifecycle of IAM users in AWS can be time-consuming. This post explores how to authenticate users against Azure AD for access to one or multiple AWS accounts using SAML federation. Additionally, it includes a walkthrough on how to setup the federation across Azure AD and multiple AWS accounts.

Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax

Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.