AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Transmit-Security-APN-Blog-061323

Risk-Based, Fine-Grained Authorization with Transmit Security and Amazon Verified Permissions

Managing and securing account access can feel like navigating a complex landmine of risk. Learn how to take a risk score calculated by Transmit Security and use it as an input to an authorization decision made by Amazon Verified Permissions, which delivers a pre-built system that simplifies policy-based access control and is flexible enough to address the most advanced authorization requirements for custom applications. With granular policies, it’s highly effective for determining who has access to what.

CyberArk-APN-Blog-061423

Controlling Access to Amazon API Gateway with CyberArk Identity and Amazon Verified Permissions

SaaS applications and services secure access to their resources by adding logic to make decisions when handling a user request. These decisions can be based on user roles and attributes, request context, and more. In this post, learn how CyberArk Identity works seamlessly as the identity provider with Amazon Verified Permissions. A managed authorization service, Amazon Verified Permissions provides a scalable, fine-grained permissions management and authorization service for custom apps.

Strata-Identity-APN-Blog-061423

Applying Fine-Grained Authorization to Legacy Apps with Strata Identity Orchestration and Amazon Verified Permissions

Achieving a zero-trust architecture is a top priority for many organizations, and a big part is externalizing authorization to ensure least privilege access for all applications. Amazon Verified Permissions is a fine-grained authorization service for developers building custom applications. Learn how Strata Identity’s Maverics Identity Orchestration platform allows you to simplify cloud migration and modernization projects by augmenting your datasets to ensure comprehensive policy enforcement.

Streamline Your HIPAA Security Program on AWS with Dash ComplyOps

Healthcare organizations and software providers that build and manage healthcare workloads must formulate the appropriate strategies to establish an effective security and compliance program. Walk through best practices for AWS customers to build, monitor, and maintain a robust HIPAA security program across AWS cloud environments, and learn how to automate compliance efforts by leveraging AWS-native services alongside Dash ComplyOps.

Delivering Comprehensive Cybersecurity Insights with Tenable One Data Platform on AWS

Tenable One Exposure Management Platform gives organizations a comprehensive view of their attack surface and vulnerabilities to prevent likely attacks and accurately communicate cyber risk. Learn how the Tenable data engineering team uses AWS to ingest data from multiple sources and transform it into a single standard structure. By standardizing into a single data structure, Tenable can focus on giving customers the business insights and actionable intelligence they need from an exposure management platform.

How Drata’s Continuous Compliance Solution Helps SaaS Providers Streamline Compliance on AWS

Learn how Drata’s suite of continuous automated compliance solutions can help accelerate SaaS providers’ journey to compliance frameworks. These solutions allow customers, such as SaaS providers, to monitor their diverse workload spread across multiple accounts, and customize the controls they need to apply for their chosen compliance framework, and any of the other 14+ frameworks to which Drata has mapped their controls.

Kiteworks-APN-Blog-053123

Kiteworks Accelerates Private Content Network Provisioning with Automation on AWS

Securing digital communications across omnichannel depends on the tools used by the organization. Kiteworks delivers a dedicated Private Content Network (PCN) to unify, track, control, and secure the private information interchanged between organizations and their trusted partners like consultants, customers, and suppliers. Learn how Kiteworks uses AWS for infrastructure provisioning, data protection, and automation of its PCN.

Sysdig-APN-Blog-051823

Automate Security and Monitoring with Amazon EKS Blueprints, Terraform, and Sysdig

Many companies report the biggest challenge when adopting Kubernetes is a lack of in-house skills. Infrastructure as code (IaC) blueprints can mitigate these gaps by accelerating hands-on experience, providing a reproducible foundation to configure, provision, and destroy clusters easily. Learn how Sysdig launched an add-on for Amazon EKS as well as Sysdig EKS Blueprints to enable organizations to confidently deploy instrumented Kubernetes clusters using Terraform.

Cloud-Storage-Security-APN-Blog-051123

Integrating Malware Scanning into Your Data Ingestion Pipeline with Antivirus for Amazon S3

Antivirus for Amazon S3 by Cloud Storage Security (CSS) is a self-hosted malware solution, installed in the customer’s AWS account so data doesn’t leave the customer’s AWS account. Learn how to easily scan your workloads using Antivirus for Amazon S3, and how to integrate malware scanning into your data ingestion pipeline. Cloud Storage Security is an AWS Security Competency Partner that helps prevent the spread of malware and locates sensitive data for applications and data lakes that use AWS manages services.

Claroty-APN-Blog-050523

Improve Your Security Posture with Claroty xDome Integration with AWS Security Hub

Industrial digital transformation is driving changes to the operational technology (OT) landscape, making it more connected to the internet, IT systems, and solutions. With OT/IT convergence, there is greater access to critical OT systems and increasing susceptibility to malware and ransomware. Learn how Claroty xDome and AWS Security Hub can be used for security and vulnerability monitoring, and to provide visibility of security events to teams responsible for operational monitoring.