AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Malware Scanning for Regulated Workloads on AWS with Cloud Storage Security

Many of the requirements for meeting and maintaining a secure environment can be met by using AWS FedRAMP-authorized regions and services, which can simplify and reduce costs of the process. Over 2,000 government agencies and other entities that provide services to government agencies are using AWS services today. Learn how Antivirus for Amazon S3 by Cloud Storage Security can be used to automate malware scanning for application workflows or data ingestion pipelines to achieve data security and compliance.

Security-Competency-DSPM-TEAM-featured

AWS Security Competency Adds DSPM and TEAM Use Cases for ISV Partners

In today’s fast-evolving digital landscape, security remains a concern for organizations of all sizes. As the threat landscape evolves, so do the solutions that address these challenges. The AWS Security Competency for ISVs aligns partner cyber security offerings to the needs of AWS customers, which is why the program now includes the “Data Security Posture Management” use case in the Data Protection category, and the “Temporary Elevated Access Management” use case in the Identity and Access Management category.

GitLab-APN-Blog-082023

Setting Up OpenID Connect with GitLab CI/CD to Provide Secure Access to Environments in AWS Accounts

When building out a CI/CD pipeline, there are ways to proactively harden your pipelines when they need to access environments in AWS accounts. Given that your pipeline will have create and destroy access to critical components of your AWS-based environments, it’s important to evaluate how GitLab Runner authenticates and authorizes for access to your AWS accounts. Learn how the new OpenID Connect (OIDC) for GitLab CI/CD jobs can help you access AWS services using GitLab.

Aviatrix-APN-Blog-082023

Using Aviatrix Secure Networking to Simplify Multi-Cloud Connectivity and Fully Leverage AWS

As organizations continue to expand their cloud infrastructure, they have ongoing requirements to connect their AWS environments to other cloud providers. However, connecting different cloud networks seamlessly and securely can be a challenge due to varying networking architectures, security models, and operational tools. Learn how Aviatrix Systems simplifies this process and enables businesses to fully leverage AWS while easily connecting to other cloud providers.

Veeam-APN-Blog-081523

Integrating Kasten K10 with Amazon GuardDuty for Security Monitoring

Kasten K10 by Veeam makes backing up and restoring data easy in the event of a security breach or unintended or unauthorized data manipulation. K10’s cloud-native philosophy inherently makes it easy to integrate into security monitoring systems without much effort. Learn about the Kubernetes Audit and how Kasten K10 natively integrates with it, and explore how to configure Amazon GuardDuty and find K10 events in Amazon CloudWatch logs which GuardDuty pulls from.

Importance and Impact of Compliance for SaaS Solutions on AWS

AWS experts break down what SaaS providers should consider in designing and building their compliant solution. We’ll dive into how achieving compliance will be an ongoing process, but regular monitoring and reporting can help make adhering to these frameworks a standard part of business operations. Good security controls, data privacy, and data management should be foundational components of a SaaS application from the beginning.

Second-Front-APN-Blog-081423

Accelerate SaaS Delivery onto DoD Networks with Game Warden from Second Front Systems

Software-as-a-service products have revolutionized private sector business operations in recent years, but despite the commercial sector’s demonstrated success with SaaS the U.S. Department of Defense (DoD) has been slow to adopt this new delivery model. Learn how the Game Warden platform, built by Second Front Systems, a DoD-compliant DevSecOps platform as a service that accelerates software delivery onto DoD networks while adhering to stringent cybersecurity controls.

Bosch-APN-Blog-081123

Build and Deploy Secure AI Applications with AIShield and Amazon SageMaker

Adversarial machine learning (AML) attacks, also known as “artificial intelligence attacks” (AI attacks), involve deliberate attempts to manipulate or compromise machine learning models or even make it reveal sensitive information. Explore how AIShield‘s seamless integration within the Amazon SageMaker environment alleviates AI security concerns by mitigating risks before and after deployment, enabling customers to develop and deploy AI applications with confidence.

Streamlining Secrets Management for Enhanced Security Using CyberArk Secrets Hub and AWS

As organizations evolve with hybrid architectures and build on AWS, their developers want to rely on the native AWS Secrets Manager to simplify development and operations. Learn about a jointly developed solution between CyberArk and AWS that was designed to centralize control of secrets, automate rotation, and eliminate vault sprawl for security teams while making no changes to developer workflows. The CyberArk identity solution is CyberArk’s SaaS-delivered identity and access management.

Kyndryl-APN-Blog-080923

Simplify, Optimize, and Automate Cloud Operations with Kyndryl Cloud Native Services for AWS

Kyndryl Cloud Native Services for AWS (KCNS) is designed to accelerate and automate managed services for workloads leveraging AWS-native services. KCNS provides a web interface, called Control Plane, for users to perform various operations, including CloudOps, SecOps, and FinOps. This post explains how to simply, optimize, and automate cloud operations with KCNS for AWS and is targeted at pre-sales and delivery architects set out to design cloud-native solutions for customers.