AWS Partner Network (APN) Blog

Tealium-AWS-Partners

Where Does a Customer Data Platform Fit in With My AWS Data Lake?

When it comes to evaluating tools and technologies that focus on customer data, it can be difficult to understand how one tool differentiates from the next. Tealium was one of the first entrants in the Customer Data Platform (CDP) category and helped shape the industry. As such, Tealium is uniquely positioned to help organizations make the most of their data and offer more ways to deliver high-quality customer data to AWS in real-time.

Say Hello

Say Hello to 66 New AWS Competency, Service Delivery, Service Ready, and MSP Partners Added in April

We are excited to highlight 66 AWS Partners that received new designations in April for our global AWS Competency, AWS Managed Service Provider (MSP), AWS Service Delivery, and AWS Service Ready programs. These designations span workload, solution, and industry, and help AWS customers identify top AWS Partners that can deliver on core business objectives. AWS Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Veritas-AWS-Partners

How to Reduce Your Data Storage Costs with Veritas NetBackup on AWS  

Migrating your Veritas protected data, tape backups, and infrastructure to AWS allows for increased flexibility in managing data through its lifecycle. Leveraging this strategy in conjunction with Veritas NetBackup‘s deduplication capabilities allows you to realize cost savings over managing your data on-premises. Veritas on AWS ensures your data is highly available and provides savings over storing data in your data center and/or managing the tape backup archival process.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 4: Available Permissions and User Identity

When it debuted 10 years ago, AWS Identity and Access Management (IAM) supported15 services. Today, it’s woven into the core of everything in the AWS Cloud. Check out the fourth and final blog post celebrating IAM‘s 10th anniversary. Dive deep on the Service Authorization Reference, a comprehensive list of all the permissions in AWS, and explore the AWS CloudTrail userIdentity element that keeps track of who did what.

Complexities and Best Practices for AWS Lambda Logging

Serverless has many benefits, but logging from AWS Lambda is like an artistic, creative process. It requires thought and vision to bring together the pieces and assemble them into something organized and functional. The Big Compass Serverless Logging Framework is also a validated AWS solution that helps standardize logs across teams, business units, and Lambdas, easing the burden of implementing a complicated logging framework.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions

This is our third blog post celebrating AWS Identity and Access Management (IAM)‘s 10th anniversary. Explore two powerful ways that you can limit access to AWS by setting the boundaries and conditionally provide access to resources in IAM policies. Permissions boundaries can be used for situations like granting someone limited permissions management abilities, while conditions enable you to specify when a policy statement is enforced.

Contino-AWS-Partners

Using AWS CloudFormation Modules to Improve Enterprise Security

Dive deep on AWS Identity and Access Management (IAM) permissions and how the principle of least privilege can be best achieved when using AWS CloudFormation, and more specifically CloudFormation Modules, to provision resources on AWS. CloudFormation Modules are a way to package resource configurations for inclusion across stack templates, in a transparent, manageable, and repeatable way.

Top Recommendations for IAM from Our AWS Heroes – Part 2: The Visual Editor and Federation

AWS Identity and Access Management (IAM)‘s 10th anniversary continues with Part 2 of our blog series. Writing an IAM policy can be tricky, but don’t feel overwhelmed. Learn how the IAM visual editor helps you create policies by providing helpful documentation and the correct syntax. You’ll also learn why you should use federation due to the short-term credentials made possible by IAM roles. More tips like these can be found throughout our 4-part blog series.

Leveraging Amazon EC2 F1 Instances for Development and Red Teaming in DARPA’s First-Ever Bug Bounty Program

Learn how DARPA engaged AWS Premier Consulting Partner Effectual to ensure a secure and reliable AWS environment, as well as to develop a serverless web application that allowed click-button FPGA SoC provisioning to red team researchers for the different processor variants. The result was DARPA’s first public bug bounty program, which enabled research teams to improve their hardware defenses by addressing any discovered weaknesses or bugs.

IAM 10th Anniversary: Top Recommendations for Working with IAM from Our AWS Heroes – Part 1

This year marks the 10th anniversary of AWS Identity and Access Management (IAM), which is essential in securing your applications and your AWS environment as a whole. To help you get the most out of this critical AWS service, we are excited to share a blog series featuring top recommendations for using IAM from AWS Heroes and APN Ambassadors, who will share recommendations which are driven from personal experiences using a service that’s foundational for the security of AWS customers.