AWS Partner Network (APN) Blog

Tag: AWS IAM

Secure Certificate Management with HashiCorp Consul on AWS

The adoption of service mesh has been accelerated by the emergence of microservices. Companies leverage orchestration tools for deploying services, and then use a service mesh to manage the connections between them. These solutions provide important capabilities, such as traffic management and load balancing. Learn how HashiCorp Consul and AWS Certificate Manager Private CA automate certificate management, perform signing operations, and rotate private certificates.

Read More
CloudZero_AWS-Partners

Improving Dataset Query Time and Maintaining Flexibility with Amazon Athena and Amazon Redshift

Analyzing large datasets can be challenging, especially if you aren’t thinking about certain characteristics of the data and what you’re ultimately looking to achieve. There are a number of factors organizations need to consider in order to build systems that are flexible, affordable, and fast. Here, experts from CloudZero walk through how to use AWS services to analyze customer billing data and provide value to end users.

Read More
AWS Partner Network

The Most Viewed APN Blog Posts in 2019

Take a look at the most popular APN Blog posts in 2019. Our goal with this blog is to share timely and relevant news, technical solutions, partner success stories, and more from Amazon Web Services and the AWS Partner Network (APN) specifically. The APN is the global partner program for AWS and helps tens of thousands of organizations across the world build, market, and sell their AWS-based offerings. Thank you for reading, and Happy New Year!

Read More
Ping Identity_AWS Solutions

Simplifying Fine-Grained Access to AWS Resources with Ping Identity

With the recent launch of AWS Identity and Access Management (IAM) session tags, customers can simplify fine-grained access to Amazon Web Services (AWS) resources by using attributes from their own corporate directories in permissions rules. Enterprise customers frequently manage their workforce identities (the “who”) using an identity provider (IdP) such as PingFederate or PingOne for Enterprise by Ping Identity.

Read More
Cloud Conformity_AWS Solutions

How to Add Security and Compliance Auto-Remediation with the Cloud Conformity Platform

Automation is becoming more and more critical to organizations needing to manage and govern cloud infrastructure. Cloud Conformity’s auto-remediation tool helps to alleviate security and compliance concerns by using AWS Lambda to fix any non-compliant resources within your AWS account. Cloud Conformity is an assurance and governance tool that continuously monitors one or more AWS services based on AWS Well-Architected best practices.

Read More
Splunk_AWS Solutions

How to Reduce AWS Storage Costs for Splunk Deployments Using SmartStore

It can be overwhelming for organizations to keep pace with the amount of data being generated by machines every day. There’s a great deal of meaningful information that can be extracted from data, but companies need software vendors to develop tools that help. In this post, learn about Splunk SmartStore and how it helps customers to reduce storage cost in a Splunk deployment on AWS. Many customers are using SmartStore to reduce the size of Amazon EBS volumes and moving data to Amazon S3.

Read More
HashiCorp_AWS Solutions

How to Secure Enterprise Cloud Environments with AWS and HashiCorp

Security isn’t always top of mind for developers because it can slow down software releases. HashiCorp Vault helps eliminate much of the security burden developers experience while trying to comply with security team requirements. Vault was built to address the difficult task of passing sensitive data to users and applications without it being compromised. Within Vault, all transactions are token-based, which limits potential malicious activity, and provides greater visibility into whom and what is accessing that information.

Read More

Automating Security, Governance, and Monitoring in AWS Landing Zone to Save Time, Effort, and Cost

Enterprises migrating to AWS with multiple applications and distributed teams often lack centralized governance, management, or security systems. With AWS Landing Zone, you can configure and provision a secure, scalable, automated, multi-account AWS environment aligned with AWS best practices without existing resources. It gives you granular, centralized control over your cloud workloads, with a consistent level of security and compliance across all accounts.

Read More
AWS Security

Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage

DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities.

Read More
SaaS Factory_feature

Managing SaaS Identity Through Custom Attributes and Amazon Cognito

Identity is a fundamental design decision that software as a service (SaaS) architects must consider when developing a multi-tenant system. Developers who are building SaaS applications must be able to identify a user, the tenant associated with the user, the user’s permissions, and the relationship a tenant has with the provider, such as usage plan or tier. In this post for SaaS Technology Partners, I will explore how to architect a multi-tenant system and identify tenant context and role using Amazon Cognito.

Read More