AWS Partner Network (APN) Blog

Tag: Amazon Linux

Aqua-AWS-Partners

Deploying DevSecOps on Amazon EKS with Aqua Security — Part 1

Customers running their microservices-based applications on Amazon EKS come to Aqua Security looking for guidance about architecting end-to-end CI/CD pipelines using DevSecOps principles. Sometimes called security as code, DevSecOps integrates security best practices into a DevOps pipeline instead of bolting them on at the end. Aqua Security has formulated a security portfolio that provides coverage throughout the application development lifecycle while also securing the underlying infrastructure.

Read More
Cognizant-AWS-Partners

Change Data Capture from On-Premises SQL Server to Amazon Redshift Target

Change Data Capture (CDC) is the technique of systematically tracking incremental change in data at the source, and subsequently applying these changes at the target to maintain synchronization. You can implement CDC in diverse scenarios using a variety of tools and technologies. Here, Cognizant uses a hypothetical retailer with a customer loyalty program to demonstrate how CDC can synchronize incremental changes in customer activity with the main body of data already stored about a customer.

Read More
AWS Service Ready-ol

AWS Service Ready Helps Customers Find Products Validated to Run on Amazon Linux 2

The Amazon Linux 2 Ready program, part of the AWS Service Ready Program, makes it easy for AWS customers to find solutions that follow AWS best practices for integrating with Amazon Linux 2. These trusted APN Technology Partners offer customers Amazon Linux 2-supported products, including monitoring agents, databases, application servers, and beyond. Their applications go through rigorous testing by AWS Partner Solutions Architects to ensure customers have a consistent experience using the software.

Read More
KernelCare-Logo-1

Live Patching Linux Kernel Vulnerabilities with AWS and KernelCare

Automatic software patching is not yet seen as a security benefit, even though out-of-date software is the cause of many recent cybersecurity failures. As companies and their staff become more security-aware and, in some cases, legally accountable for security breaches, system administrators are starting to see automated Linux kernel live patching as the missing link in their system security profiles. Despite the disadvantages, a system with live patching is safer than one without.

Read More