AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

AWS-Solution-Provider-Program-1

AWS Control Tower Best Practices for AWS Solution Providers

As AWS Control Tower is adopted more and more, it’s important that AWS Consulting Partners within the AWS Solution Provider Program can leverage the multi-account benefits Control Tower offers. Learn how the Solution Provider Program is flexible in the types of customer models it allows. This flexibility serves the end customer’s business needs. However, AWS Partners must take care in how they architect AWS Organizations for their customers, which directly impacts the use of Control Tower.

TalaTek-AWS-Partners

How TalaTek Uses Amazon CloudWatch for Security Information and Event Management

Learn how TalaTek uses Amazon CloudWatch as an alternative to traditional SIEM solutions with the same functionality. CloudWatch gives TalaTek system-wide visibility, allowing them to monitor their AWS-based SaaS solution, the TalaTek Intelligent Governance and Risk Integrated Solution (TiGRIS). CloudWatch helps TalaTek keep TiGRIS running efficiently while allowing us to meet FedRAMP logging requirements.

AWS-Startup-Partners-1

AWS Startup Showcase Highlights Innovators in AI, Security, and Life Sciences

From pre-seed to IPO, the world’s most innovative startups build on AWS. This month, we’re excited to show our support through the next AWS Startup Showcase, a virtual AWS Loft-style event we’re hosting in partnership with theCUBE. The event is geared towards an audience of business decision makers, developers, and IT professionals. It features some of the most innovative companies from the APN Global Startup Program showcasing their latest offerings and innovations in AI, security, and life sciences.

AWS-Amplify-1

Implementing Multi-Factor Authentication in React Using Auth0 and AWS Amplify

AWS Amplify is a set of tools and services that can be used, together or on their own, to help frontend web and mobile developers build scalable full stack applications. With Amplify, you can configure app backends and connect your app in minutes, deploy static web apps in a few clicks, and easily manage app content outside the AWS Management Console. Learn how to add multi-factor authentication to a React Single-Page Application (SPA) using Auth0 and AWS Amplify.

ALTR-AWS-Partners

How ALTR Helped Q2’s Biller Direct Offering Become Level 1 PCI DSS Certified in 30 Days

Learn how Q2, a financial experience company that provides digital banking and lending solutions, worked with AWS ISV Partner ALTR, a provider of data security as a service that runs exclusively on AWS, to launch a PCI DSS-compliant application in a fraction of the time it normally takes to achieve certification. Q2’s Biller Direct application provides a centralized payment environment where users can enroll, manage their bills, and view projected spend.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 4: Available Permissions and User Identity

When it debuted 10 years ago, AWS Identity and Access Management (IAM) supported15 services. Today, it’s woven into the core of everything in the AWS Cloud. Check out the fourth and final blog post celebrating IAM‘s 10th anniversary. Dive deep on the Service Authorization Reference, a comprehensive list of all the permissions in AWS, and explore the AWS CloudTrail userIdentity element that keeps track of who did what.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions

This is our third blog post celebrating AWS Identity and Access Management (IAM)‘s 10th anniversary. Explore two powerful ways that you can limit access to AWS by setting the boundaries and conditionally provide access to resources in IAM policies. Permissions boundaries can be used for situations like granting someone limited permissions management abilities, while conditions enable you to specify when a policy statement is enforced.

Contino-AWS-Partners

Using AWS CloudFormation Modules to Improve Enterprise Security

Dive deep on AWS Identity and Access Management (IAM) permissions and how the principle of least privilege can be best achieved when using AWS CloudFormation, and more specifically CloudFormation Modules, to provision resources on AWS. CloudFormation Modules are a way to package resource configurations for inclusion across stack templates, in a transparent, manageable, and repeatable way.

Top Recommendations for IAM from Our AWS Heroes – Part 2: The Visual Editor and Federation

AWS Identity and Access Management (IAM)‘s 10th anniversary continues with Part 2 of our blog series. Writing an IAM policy can be tricky, but don’t feel overwhelmed. Learn how the IAM visual editor helps you create policies by providing helpful documentation and the correct syntax. You’ll also learn why you should use federation due to the short-term credentials made possible by IAM roles. More tips like these can be found throughout our 4-part blog series.

IAM 10th Anniversary: Top Recommendations for Working with IAM from Our AWS Heroes – Part 1

This year marks the 10th anniversary of AWS Identity and Access Management (IAM), which is essential in securing your applications and your AWS environment as a whole. To help you get the most out of this critical AWS service, we are excited to share a blog series featuring top recommendations for using IAM from AWS Heroes and APN Ambassadors, who will share recommendations which are driven from personal experiences using a service that’s foundational for the security of AWS customers.