AWS Partner Network (APN) Blog

Tag: Amazon Inspector

ServiceNow-AWS-Partners

Sending Amazon Inspector’s Common Vulnerabilities and Exposures Findings to the ServiceNow SecOps Module

This post will show you how to send Amazon Inspector‘s Common Vulnerabilities and Exposures (CVE) findings to the ServiceNow Security Operations (SecOps) module. At the time of this write-up, there is no native adaptor from AWS to the ServiceNow SecOps module and, as such, requires a custom integration. Learn how to use ServiceNow’s native RESTful API to create a custom interface that an AWS Lambda function will leverage to send the CVE findings as they reach AWS Security Hub.

Read More
Atos-AWS-Partners

Driving Business Innovation and Delivering Cloud Security with Digital Cloud Services from Atos

Digital Cloud Services (DCS) is a fully managed AWS landing zone-as-a-service from Atos, and the DCS solution offers a managed landing zone platform with enterprise-grade security. It provides customers with the ideal environment to start or continue their business transformation, at pace and scale in a self-service manner. With DCS, customers are safe in the knowledge the underlying platform is built to CIS benchmarks and AWS Well-Architected Framework standards.

Read More
Deloitte-AWS-Partners

Managing Cybersecurity Risks with the Next Generation of Managed Security Services  

Both AWS and Deloitte understand that a customer’s cloud journey is different and have their own set of requirements. This is why Deloitte’s Guardian for AWS solution provides a wide range of options for businesses to choose from to create the right package for them. Learn how Guardian for AWS can help organizations become more trustworthy, resilient, and secure through proactive management of cyber risks.

Read More
CIS-AWS-Partners

How to Decide Between Building or Buying a CIS Hardened Image

The Center for Internet Security (CIS) is responsible for the CIS Controls and CIS Benchmarks, which are globally recognized best practices for securing IT systems and data. The implementation of these can help harden systems through various means, whether it be disabling unnecessary ports or eliminating unneeded services. Purchasing a pre-hardened image is a great option, especially since you are ensured compliance with the CIS Benchmark, and deploying it would not require much maintenance on your end.

Read More