AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Databricks_AWS-Competency

Enabling AWS Single Sign-On (SSO) Service Integration with Databricks Control Plane

AWS Single Sign-On makes it easy to centrally manage SSO access to multiple AWS accounts and business applications. You can use AWS SSO to create and manage users centrally and grant access to AWS accounts and business applications, such as Databricks. Instead of having to sign in separately to Databricks Control Plane and other business applications, with this configuration enabled users can access Databricks with their corporate credentials using AWS SSO.

Secure Certificate Management with HashiCorp Consul on AWS

The adoption of service mesh has been accelerated by the emergence of microservices. Companies leverage orchestration tools for deploying services, and then use a service mesh to manage the connections between them. These solutions provide important capabilities, such as traffic management and load balancing. Learn how HashiCorp Consul and AWS Certificate Manager Private CA automate certificate management, perform signing operations, and rotate private certificates.

Deep-Instinct_AWS-Competency

How Deep Neural Networks Built on AWS Can Help Predict and Prevent Security Threats

Deep learning is inspired by the human brain and once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial neural network learns to detect more and more types of cyber threats, its prediction capabilities become instinctive. As a result, malware both known and new can be predicted and prevented in zero-time. Deep Instinct’s predictive threat prevention platform can be applied against known or unknown threats, whether it be a file or fileless attack.

Ping Identity_AWS Solutions

Simplifying Fine-Grained Access to AWS Resources with Ping Identity

With the recent launch of AWS Identity and Access Management (IAM) session tags, customers can simplify fine-grained access to Amazon Web Services (AWS) resources by using attributes from their own corporate directories in permissions rules. Enterprise customers frequently manage their workforce identities (the “who”) using an identity provider (IdP) such as PingFederate or PingOne for Enterprise by Ping Identity.

Cloud Conformity_AWS Solutions

How to Add Security and Compliance Auto-Remediation with the Cloud Conformity Platform

Automation is becoming more and more critical to organizations needing to manage and govern cloud infrastructure. Cloud Conformity’s auto-remediation tool helps to alleviate security and compliance concerns by using AWS Lambda to fix any non-compliant resources within your AWS account. Cloud Conformity is an assurance and governance tool that continuously monitors one or more AWS services based on AWS Well-Architected best practices.

Microchip_AWS Solutions

Implementing Secure Authentication with AWS IoT and Microchip’s Trust Platform

The ultimate potential of IoT will only be achieved if the security of such a vastly powerful and complex system can be maintained. Doing so requires security implementations to be simple and mainstream. Microchip Technology is a leading provider of microcontroller and analog semiconductors, providing low-risk product development, lower total system cost, and faster time to market for thousands of diverse customer applications worldwide.

WhiteSource_AWS Solutions

How to Bake Open Source Security into Your AWS CodeBuild Pipeline

Managing open source vulnerabilities can be challenging, especially at scale in a fast-moving continuous integration pipeline. Developers and DevOps professionals depend on CI pipeline tools like AWS CodeBuild to help them develop and test software at a breakneck pace, pushing out new software with greater efficiency and flexibility. In this post, learn how to integrate WhiteSource into CodeBuild pipeline to fuse open source security into existing build processes without having to compromise on speed or agility.

HashiCorp_AWS Solutions

How to Secure Enterprise Cloud Environments with AWS and HashiCorp

Security isn’t always top of mind for developers because it can slow down software releases. HashiCorp Vault helps eliminate much of the security burden developers experience while trying to comply with security team requirements. Vault was built to address the difficult task of passing sensitive data to users and applications without it being compromised. Within Vault, all transactions are token-based, which limits potential malicious activity, and provides greater visibility into whom and what is accessing that information.

AWS Security

Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage

DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities.

Security-8

How to Benchmark and Prioritize Security Threats in Amazon GuardDuty Using Sumo Logic

Users looking for enhanced security operations within their AWS environment can utilize Sumo Logic Global Intelligent Service (GIS) for Amazon GuardDuty. This solution allows organizations to separate the signal from the noise within your security alerts, helping to more accurately pinpoint investigations and resources. This comparison data allows companies to bolster their security efforts by proactively identifying and remediating threats.