AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

How Cloudanix Secures Containerized Applications Running on Amazon EKS

Kubernetes security is often approached in a fragmented way, separating build time, runtime, and infrastructure security. An interconnected security approach is essential, acknowledging relationships between build, runtime, and infrastructure. Cloudanix enables this through end-to-end integration, from build time image scanning to runtime threat monitoring, strengthening security posture by reducing attack surface, enhancing compliance, and empowering swift response.

Trellix-APN-Blog-121823

Trellix vIPS and AWS Gateway Load Balancer Integrate for a Next-Gen Intrusion Prevention System

As enterprises migrate to the cloud, advanced cybersecurity solutions are essential to prevent sophisticated attacks. Trellix’s virtual intrusion prevention system (vIPS) integrates with AWS Gateway Load Balancer to provide real-time threat detection and prevention. Utilizing techniques like behavioral analysis and signatureless detection, Trellix vIPS helps secure VPCs against evolving threats. As an AWS Specialization Partner, Trellix enables resilience against cyberattacks for customers’ cloud environments.

MetricStream-APN-Blog-121123

Enhancing Governance, Risk, and Compliance Programs with AWS Audit Manager and MetricStream CyberGRC

Governance, risk, and compliance (GRC) programs often require extensive custom controls that address a range of compliance standards and internal governance objectives. AWS Audit Manager helps to continuously audit cloud usage to simplify risk assessment and compliance with regulation and industry standards. Learn how MetricStream has collaborated with AWS to facilitate the controls and evidence collection hand-off between AWS Audit Manager and MetricStream CyberGRC.

Federate Single Sign-On Access to Amazon Athena Query Editor with OneLogin

The Amazon Athena web-based query editor enables data consumers to author and run SQL queries on data sources that are registered with the AWS Glue Data Catalog and other data sources such as Amazon S3. This post describes the setup to provide federated access with OneLogin as the identity provider to securely access, author, and run queries in the Athena web-based editor via the AWS console, without the need for users to install a JDBC driver or run a SQL client on their machines.

Access Affordable Policies with New Security Posture Assessment from AWS Cyber Insurance Competency Partners

We’re excited to announce the AWS Cyber Insurance Competency, which makes it easy for customers—particularly Small and Medium Businesses—to find affordable policies from insurers that integrate their security posture assessment through a new, simplified customer experience with AWS Security Hub. AWS Cyber Insurance Competency Partners worked with AWS to digitally transform their assessment and onboarding process, which rewards customers that present a security posture following AWS best practices.

DoControl-APN-Blog-110623

How Vox Media Automates SaaS Security Risk Controls with DoControl

Security leaders face the dual challenge of cost reduction and resource optimization, while mitigating security threats throughout their organization. A SaaS Ecosystem Security (SES) allows you to centralize data across multiple applications to provide end-to-end visibility into your exposure. Learn how DoControl can help provide visibility, monitoring, and automated remediation to risks that can often be overlooked. DoControl enables customers to accelerate SaaS security risk controls with its SaaS Ecosystem Security.

1Kosmos-APN-Blog-103123

Integrating Amazon Cognito with 1Kosmos BlockID for Enhanced Security and User Experience

Multi-factor authentication (MFA) enhances security for web and mobile applications by requiring additional identification methods other than a password. Providing a frictionless user experience with MFA often requires a variety of authentication options that support a range of users and devices. Learn how 1Kosmos BlockID and Amazon Cognito can help to balance security with usability when building customer facing applications.

Filter and Stream Logs from Amazon S3 Logging Buckets into Splunk Using AWS Lambda

This post showcases a way to filter and stream logs from centralized Amazon S3 logging buckets to Splunk using a push mechanism leveraging AWS Lambda. The push mechanism offers benefits such as lower operational overhead, lower costs, and automated scaling. We’ll provide instructions and a sample Lambda code that filters virtual private cloud (VPC) flow logs with “action” flag set to “REJECT” and pushes it to Splunk via a Splunk HTTP Event Collector (HEC) endpoint.

Ensono-APN-Blog-102523

Using AWS Trusted Advisor to Drive Operational Excellence with Ensono Envision Advisor

AWS Trusted Advisor inspects your AWS environment and provides recommendations to optimize infrastructure, improve security and performance, reduce cost, and monitor service quotas. Ensono Envision Advisor turns AWS Trusted Adviser recommendations into validated, prioritized, actionable insights. It ingests data before enriching it with Ensono IP to contextualize recommendations specific to end customers, making it easier to achieve operational excellence on AWS.

MP-SaaS-Security-featured

From Idea to Market: AWS Marketplace Vendor Insights for Secure SaaS

In this post, AWS experts provide a step-by-step guide on how to navigate and leverage the AWS Partner Network (APN) and AWS Marketplace, depending on where you are in your development journey. We’ll demonstrate how your security and engineering teams can integrate continuous compliance controls and how to add compliance reports and certifications to your product profile as you obtain them. Finally, we’ll show the AWS customer’s experience of obtaining access to your product’s security information.