AWS Partner Network (APN) Blog
Tag: AWS Partner Guest Post
Securing AWS IoT Greengrass Deployments with NXP’s EdgeLock SE050
Within AWS IoT fleet deployments, each connected device needs to have unique, trusted, verifiable identity. While Linux OS provides strong protection from unauthorized user access, it’s still possible to compromise the system if the attacker has full physical access to the device. NXP EdgeLock SE050 prevents attackers from extracting the private key even if the physical integrity of the device is compromised and the attacker managed to get access to the device filesystem.
Appian Workforce Safety Helps Workplaces Reopen and Stay Open
Appian is a leading provider of low-code automation software whose unified solution helps organizations ensure a safe, smooth transition back to onsite work, while maintaining the privacy and security of employee health information. Appian Workforce Safety integrates contact tracing and incident case management with vaccination tracking, health monitoring, COVID-19 testing, and facility and visitor management into a single response hub.
Where Does a Customer Data Platform Fit in With My AWS Data Lake?
When it comes to evaluating tools and technologies that focus on customer data, it can be difficult to understand how one tool differentiates from the next. Tealium was one of the first entrants in the Customer Data Platform (CDP) category and helped shape the industry. As such, Tealium is uniquely positioned to help organizations make the most of their data and offer more ways to deliver high-quality customer data to AWS in real-time.
How to Reduce Your Data Storage Costs with Veritas NetBackup on AWS
Migrating your Veritas protected data, tape backups, and infrastructure to AWS allows for increased flexibility in managing data through its lifecycle. Leveraging this strategy in conjunction with Veritas NetBackup‘s deduplication capabilities allows you to realize cost savings over managing your data on-premises. Veritas on AWS ensures your data is highly available and provides savings over storing data in your data center and/or managing the tape backup archival process.
Top Recommendations for Working with IAM from Our AWS Heroes – Part 4: Available Permissions and User Identity
When it debuted 10 years ago, AWS Identity and Access Management (IAM) supported15 services. Today, it’s woven into the core of everything in the AWS Cloud. Check out the fourth and final blog post celebrating IAM‘s 10th anniversary. Dive deep on the Service Authorization Reference, a comprehensive list of all the permissions in AWS, and explore the AWS CloudTrail userIdentity element that keeps track of who did what.
Complexities and Best Practices for AWS Lambda Logging
Serverless has many benefits, but logging from AWS Lambda is like an artistic, creative process. It requires thought and vision to bring together the pieces and assemble them into something organized and functional. The Big Compass Serverless Logging Framework is also a validated AWS solution that helps standardize logs across teams, business units, and Lambdas, easing the burden of implementing a complicated logging framework.
Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions
This is our third blog post celebrating AWS Identity and Access Management (IAM)‘s 10th anniversary. Explore two powerful ways that you can limit access to AWS by setting the boundaries and conditionally provide access to resources in IAM policies. Permissions boundaries can be used for situations like granting someone limited permissions management abilities, while conditions enable you to specify when a policy statement is enforced.
Using AWS CloudFormation Modules to Improve Enterprise Security
Dive deep on AWS Identity and Access Management (IAM) permissions and how the principle of least privilege can be best achieved when using AWS CloudFormation, and more specifically CloudFormation Modules, to provision resources on AWS. CloudFormation Modules are a way to package resource configurations for inclusion across stack templates, in a transparent, manageable, and repeatable way.
Top Recommendations for IAM from Our AWS Heroes – Part 2: The Visual Editor and Federation
AWS Identity and Access Management (IAM)‘s 10th anniversary continues with Part 2 of our blog series. Writing an IAM policy can be tricky, but don’t feel overwhelmed. Learn how the IAM visual editor helps you create policies by providing helpful documentation and the correct syntax. You’ll also learn why you should use federation due to the short-term credentials made possible by IAM roles. More tips like these can be found throughout our 4-part blog series.
Leveraging Amazon EC2 F1 Instances for Development and Red Teaming in DARPA’s First-Ever Bug Bounty Program
Learn how DARPA engaged AWS Premier Consulting Partner Effectual to ensure a secure and reliable AWS environment, as well as to develop a serverless web application that allowed click-button FPGA SoC provisioning to red team researchers for the different processor variants. The result was DARPA’s first public bug bounty program, which enabled research teams to improve their hardware defenses by addressing any discovered weaknesses or bugs.