AWS Partner Network (APN) Blog

Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions

This is our third blog post celebrating AWS Identity and Access Management (IAM)‘s 10th anniversary. Explore two powerful ways that you can limit access to AWS by setting the boundaries and conditionally provide access to resources in IAM policies. Permissions boundaries can be used for situations like granting someone limited permissions management abilities, while conditions enable you to specify when a policy statement is enforced.

Read More
Contino-AWS-Partners

Using AWS CloudFormation Modules to Improve Enterprise Security

Dive deep on AWS Identity and Access Management (IAM) permissions and how the principle of least privilege can be best achieved when using AWS CloudFormation, and more specifically CloudFormation Modules, to provision resources on AWS. CloudFormation Modules are a way to package resource configurations for inclusion across stack templates, in a transparent, manageable, and repeatable way.

Read More

Top Recommendations for IAM from Our AWS Heroes – Part 2: The Visual Editor and Federation

AWS Identity and Access Management (IAM)‘s 10th anniversary continues with Part 2 of our blog series. Writing an IAM policy can be tricky, but don’t feel overwhelmed. Learn how the IAM visual editor helps you create policies by providing helpful documentation and the correct syntax. You’ll also learn why you should use federation due to the short-term credentials made possible by IAM roles. More tips like these can be found throughout our 4-part blog series.

Read More

Leveraging Amazon EC2 F1 Instances for Development and Red Teaming in DARPA’s First-Ever Bug Bounty Program

Learn how DARPA engaged AWS Premier Consulting Partner Effectual to ensure a secure and reliable AWS environment, as well as to develop a serverless web application that allowed click-button FPGA SoC provisioning to red team researchers for the different processor variants. The result was DARPA’s first public bug bounty program, which enabled research teams to improve their hardware defenses by addressing any discovered weaknesses or bugs.

Read More

IAM 10th Anniversary: Top Recommendations for Working with IAM from Our AWS Heroes – Part 1

This year marks the 10th anniversary of AWS Identity and Access Management (IAM), which is essential in securing your applications and your AWS environment as a whole. To help you get the most out of this critical AWS service, we are excited to share a blog series featuring top recommendations for using IAM from AWS Heroes and APN Ambassadors, who will share recommendations which are driven from personal experiences using a service that’s foundational for the security of AWS customers.

Read More
IBM-AWS-Partners-2

Warming Amazon EC2 Instances Using AWS Lambda to Improve Application Availability

The legacy nature of its Windows application was a challenge faced by a rail manufacturer while migrating to AWS was. Refactoring the application to leverage AWS cloud-native features was not a viable option in this case, as the vendor had stopped their software maintenance and support. Learn how IBM leveraged AWS to improve the application’s long startup time by implementing a warming functionality using AWS Lambda and AWS Systems Manager.

Read More
MarkLogic-AWS-Partners

Building a Knowledge Graph for Scientific Research with MarkLogic and AWS

Organizations that prioritize data search and discovery are more productive and innovative. Deploying an intelligent search and discovery system requires organizations to change the way they integrate and curate data using semantic graphs (or knowledge graphs) to build rich search and discovery experiences. MarkLogic Data Hub Service has built-in semantic search capabilities, allowing you to quickly build knowledge graph-based applications.

Read More
Talend-AWS-Partners

Embrace Data Sovereignty and Low Latency in Building a Trusted Data Lake with AWS Outposts and Talend

Globalization and digitalization require companies to comply with data protection rules in the limitless world of the internet. Meeting this challenge requires maximum data agility and availability along with minimal data latency. Integration with AWS Outposts makes Talend Data Fabric allows you to quickly integrate, clean, and move data from different sources with low-latency, and meet data sovereignty regulatory requirements for hybrid deployments.

Read More
Sophos-AWS-Partners

Preventing Malware in Serverless Web Applications with SophosLabs Intelix

Building web applications in a serverless environment has brought many advantages, but with every big shift there are certain practices such as malware protection that need to be reinvented. Organizations need a solution that’s easy to query from web application via API with no infrastructure required. Learn how SophosLabs Intelix offers a suite of APIs which provide specific, actionable intelligence about files.

Read More
Infosys-AWS-Partners

Automate Your AWS DevOps Validation Pipeline with the Infosys Cloud Infrastructure Validation Solution

An often-overlooked aspect of migration is the configuration checks on the underlying cloud infrastructure. In order to make sure the foundational infrastructure is safe, secure and compliant, there’s a need to validate the cloud configuration early in the migration cycle. Infosys has developed an innovative automation solution that addresses the need for secure configuration reviews, while ensuring agility and reliability through the migration journey.

Read More