AWS Partner Network (APN) Blog

Tag: AWS Partner Guest Post

Securing AWS IoT Greengrass Deployments with NXP’s EdgeLock SE050

Within AWS IoT fleet deployments, each connected device needs to have unique, trusted, verifiable identity. While Linux OS provides strong protection from unauthorized user access, it’s still possible to compromise the system if the attacker has full physical access to the device. NXP EdgeLock SE050 prevents attackers from extracting the private key even if the physical integrity of the device is compromised and the attacker managed to get access to the device filesystem.

Appian-AWS-Partners

Appian Workforce Safety Helps Workplaces Reopen and Stay Open

Appian is a leading provider of low-code automation software whose unified solution helps organizations ensure a safe, smooth transition back to onsite work, while maintaining the privacy and security of employee health information. Appian Workforce Safety integrates contact tracing and incident case management with vaccination tracking, health monitoring, COVID-19 testing, and facility and visitor management into a single response hub.

Tealium-AWS-Partners

Where Does a Customer Data Platform Fit in With My AWS Data Lake?

When it comes to evaluating tools and technologies that focus on customer data, it can be difficult to understand how one tool differentiates from the next. Tealium was one of the first entrants in the Customer Data Platform (CDP) category and helped shape the industry. As such, Tealium is uniquely positioned to help organizations make the most of their data and offer more ways to deliver high-quality customer data to AWS in real-time.

Veritas-AWS-Partners

How to Reduce Your Data Storage Costs with Veritas NetBackup on AWS  

Migrating your Veritas protected data, tape backups, and infrastructure to AWS allows for increased flexibility in managing data through its lifecycle. Leveraging this strategy in conjunction with Veritas NetBackup‘s deduplication capabilities allows you to realize cost savings over managing your data on-premises. Veritas on AWS ensures your data is highly available and provides savings over storing data in your data center and/or managing the tape backup archival process.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 4: Available Permissions and User Identity

When it debuted 10 years ago, AWS Identity and Access Management (IAM) supported15 services. Today, it’s woven into the core of everything in the AWS Cloud. Check out the fourth and final blog post celebrating IAM‘s 10th anniversary. Dive deep on the Service Authorization Reference, a comprehensive list of all the permissions in AWS, and explore the AWS CloudTrail userIdentity element that keeps track of who did what.

Complexities and Best Practices for AWS Lambda Logging

Serverless has many benefits, but logging from AWS Lambda is like an artistic, creative process. It requires thought and vision to bring together the pieces and assemble them into something organized and functional. The Big Compass Serverless Logging Framework is also a validated AWS solution that helps standardize logs across teams, business units, and Lambdas, easing the burden of implementing a complicated logging framework.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions

This is our third blog post celebrating AWS Identity and Access Management (IAM)‘s 10th anniversary. Explore two powerful ways that you can limit access to AWS by setting the boundaries and conditionally provide access to resources in IAM policies. Permissions boundaries can be used for situations like granting someone limited permissions management abilities, while conditions enable you to specify when a policy statement is enforced.

Contino-AWS-Partners

Using AWS CloudFormation Modules to Improve Enterprise Security

Dive deep on AWS Identity and Access Management (IAM) permissions and how the principle of least privilege can be best achieved when using AWS CloudFormation, and more specifically CloudFormation Modules, to provision resources on AWS. CloudFormation Modules are a way to package resource configurations for inclusion across stack templates, in a transparent, manageable, and repeatable way.

Top Recommendations for IAM from Our AWS Heroes – Part 2: The Visual Editor and Federation

AWS Identity and Access Management (IAM)‘s 10th anniversary continues with Part 2 of our blog series. Writing an IAM policy can be tricky, but don’t feel overwhelmed. Learn how the IAM visual editor helps you create policies by providing helpful documentation and the correct syntax. You’ll also learn why you should use federation due to the short-term credentials made possible by IAM roles. More tips like these can be found throughout our 4-part blog series.

Leveraging Amazon EC2 F1 Instances for Development and Red Teaming in DARPA’s First-Ever Bug Bounty Program

Learn how DARPA engaged AWS Premier Consulting Partner Effectual to ensure a secure and reliable AWS environment, as well as to develop a serverless web application that allowed click-button FPGA SoC provisioning to red team researchers for the different processor variants. The result was DARPA’s first public bug bounty program, which enabled research teams to improve their hardware defenses by addressing any discovered weaknesses or bugs.