AWS Partner Network (APN) Blog

Category: Security

HeleCloud-AWS-Partners

How HeleCloud Used AWS Secrets Manager to Automate Credentials Rotation of MS SQL on Amazon EC2

HeleCloud combines AWS Secrets Manager and the AWS Systems Manager Run Command into a solution that automatically rotates secrets for databases running on Amazon EC2. In addition to automatically rotating your secrets, it allows you to access them in applications running on Amazon EKS. Learn about the HeleCloud solution and walk through the code snippets and steps required to set up automatic credentials rotation of MS SQL Server running on Amazon EC2.

Security-8

AWS Managed Security Services Partners Can Help Implement, Test, and Manage Your Perimeter Security Protection

AWS Shield Advanced provides 24×7 access to the AWS DDoS Response Team (DRT) for real-time response to impacting events. For customers that lack the resources to maintain this optimal application security posture, AWS has launched a new Perimeter Protection Managed Security Services Provider (MSSP) program that enables AWS Partners to develop and deliver a fully managed Security Operations Center (SOC) for AWS Shield Advanced, AWS WAF, and AWS Firewall Manager.

How to Enhance the Security and Compliance of Cloud Architectures with Datacom and AWS Services

Security and compliance governance is one of the most challenging problems organizations face when managing their cloud infrastructure. After years of working with AWS, Datacom Group has observed that each client has their own industry-specific security and compliance requirements. What’s needed is a solution that is flexible enough to cater to diverse customer requirements. Datacom’s governance solution is flexible and can integrate with a number of AWS native services to offer enhanced capabilities.

AWS-SaaS-Factory-1

Isolating SaaS Tenants with Dynamically Generated IAM Policies

Many SaaS organizations leverage AWS Identity and Access Management (IAM) to define a series of policies and roles that can be used to ensure tenants are not allowed to cross tenant boundaries when accessing resources. To make this work, you have to create separate policies for each tenant which can create an explosion of tenant policies that push the account limits of IAM. Learn how dynamic policy generation creates a more scalable and manageable isolation experience.

Aqua-AWS-Partners

Deploying DevSecOps on Amazon EKS with Aqua Security – Part 2

Aqua Security was built to redefine security and help you address the security skills gap in a rapidly evolving cloud-native landscape, automating security controls at the speed of DevOps. Unlike traditional security, cloud-native security cannot adopt a one-size-fits-all approach. It has to be seamlessly integrated with the existing processes, organizational culture as well as the technology. Learn how to implement a DevSecOps pipeline using AWS CodePipeline and Aqua Platform.

Kion-AWS-Partners-1

Easily Delegate Responsibilities Using AWS Permissions Boundaries and Kion

Permissions boundaries allow admins to delegate permissions to users so they can create new AWS service roles without elevating their own permissions. This removes the need for admins to field requests for these role creations and promotes self-service for users. The ultimate goal is to remove blockers for enhanced productivity. Learn how to pair permissions boundaries with Kion for increased automation and delegation.

Minimizing the PCI Compliance Burden Using Containerization, Microservices, and AWS

Leveraging cloud-based microservices is not a solution that works for everyone or every application, but it’s one more point in favor of transitioning legacy applications to microservices. If you’re already looking to re-architect, consider it an opportunity to spin out regulated data into separate containers. From there, it’s not much more effort to move those containers to AWS. Learn how AWS technologies can help organizations reduce their Payment Card Industry (PCI) compliance burden.

Okta-AWS-Partners

Implementing SAML AuthN for Amazon EMR Using Okta and Column-Level AuthZ with AWS Lake Formation

As organizations continue to build data lakes on AWS and adopt Amazon EMR, especially when consuming data at enterprise scale, it’s critical to govern your data lakes by establishing federated access and having fine-grained controls to access your data. Learn how to implement SAML-based authentication (AuthN) using Okta for Amazon EMR, querying data using Zeppelin notebooks, and applying column-level authorization (AuthZ) using AWS Lake Formation.

Aqua-AWS-Partners

Deploying DevSecOps on Amazon EKS with Aqua Security — Part 1

Customers running their microservices-based applications on Amazon EKS come to Aqua Security looking for guidance about architecting end-to-end CI/CD pipelines using DevSecOps principles. Sometimes called security as code, DevSecOps integrates security best practices into a DevOps pipeline instead of bolting them on at the end. Aqua Security has formulated a security portfolio that provides coverage throughout the application development lifecycle while also securing the underlying infrastructure.

How to Deploy a Rapid7 InsightVM Scan Engine for AWS Graviton2-Based EC2 Instances

With the recent launch of Amazon EC2 M6g instances, the new instances powered by AWS Graviton2 Arm-based processors deliver up to 40 percent better price and performance over the x86-based current generation M5 instances. At Rapid7, an AWS Security Competency Partner, thousands of customers use InsightVM scan engine to assess their EC2 instances for vulnerabilities. Learn how to deploy the InsightVM scan engine in an AWS Graviton2-based environment.