AWS Partner Network (APN) Blog

Tag: AWS IAM

DXC-AWS-Partners-1

Why a Cloud Automated Operation Model is Key for Enterprises Moving to AWS

A transformation step is key to achieving the cloud strategy benefits for organizations moving or implementing workloads to the AWS Cloud. Organizations that adopt the cloud without transforming their operation model may not realize the full benefits. Explore DXC Technology’s approach to cloud operation excellence through a Cloud Automated Operation Model, and learn how to implement it at scale and purely over managed AWS services.

OneLogin-AWS-Partners

Simplifying Sign-In for AWS Managed Services with OneLogin, AWS Single Sign-On, and AWS IAM

OneLogin, an AWS Security Competency Partner, provides an identity platform for secure, scalable, and smart experiences that connects people to technology. Learn about all of the integrations available between OneLogin and AWS. Through these integrations, OneLogin enables you to seamlessly authenticate into AWS managed services across various domains, including analytics, compute, serverless, security, management and governance, and more.

MongoDB-AWS-Partners-2

Building Serverless Event-Driven Applications with MongoDB Realm and Amazon EventBridge

Businesses are faced with ever-increasing complexity of the systems they need to run in order to stay agile and competitive. The complexity can develop over time as new systems are integrated but old ones are not retired sufficiently fast. It can also develop intentionally, such as when a monolith is decomposed into microservices. In this post, learn how to build modern, event-driven serverless applications and how MongoDB Atlas and Realm products complement serverless architectures.

AWS-Quick-Starts-1

Automated Cloud Governance Using the Superwerker on AWS Quick Start

Managing a cloud infrastructure consisting of multiple AWS accounts is an important but also complex topic for Well-Architected cloud environments. The superwerker on AWS Quick Start provides an automation of what consultants charged with building a platform and landing zone would build for a customer. As an individual consulting solution, this typically involves a mix of consulting and hands-on click ops, as well as building some automation in the customer’s preferred infrastructure provisioning tooling.

Reply-AWS-Partners

Taming Machine Learning on AWS with MLOps: A Reference Architecture

Despite the investments and commitment from leadership, many organizations are yet to realize the full potential of artificial intelligence (AI) and machine learning (ML). How can data science and analytics teams tame complexity and live up to the expectations placed on them? MLOps provides some answers. Hear from AWS Premier Consulting Partner Reply how you can “glue” the various components of MLOps together to build an MLOps solution using AWS managed services.

AWS-Outposts-Partners-2

How AWS Partners Can Get Started with AWS Outposts – By Knowing What it’s Not

In speaking with AWS Partners of all sizes and areas of expertise, it’s clear there is a growing need for getting more robust, more powerful AWS technology to the edge, in more clever ways than before. AWS Outposts is a service that allows customers to run a subset of AWS services—on fully managed AWS hardware—located in their own data center, remote office, production plant, or virtually anywhere they want them to be. The art of the possible, as cliché as it can sometimes be, really does start there.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 4: Available Permissions and User Identity

When it debuted 10 years ago, AWS Identity and Access Management (IAM) supported15 services. Today, it’s woven into the core of everything in the AWS Cloud. Check out the fourth and final blog post celebrating IAM‘s 10th anniversary. Dive deep on the Service Authorization Reference, a comprehensive list of all the permissions in AWS, and explore the AWS CloudTrail userIdentity element that keeps track of who did what.

Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions

This is our third blog post celebrating AWS Identity and Access Management (IAM)‘s 10th anniversary. Explore two powerful ways that you can limit access to AWS by setting the boundaries and conditionally provide access to resources in IAM policies. Permissions boundaries can be used for situations like granting someone limited permissions management abilities, while conditions enable you to specify when a policy statement is enforced.

Contino-AWS-Partners

Using AWS CloudFormation Modules to Improve Enterprise Security

Dive deep on AWS Identity and Access Management (IAM) permissions and how the principle of least privilege can be best achieved when using AWS CloudFormation, and more specifically CloudFormation Modules, to provision resources on AWS. CloudFormation Modules are a way to package resource configurations for inclusion across stack templates, in a transparent, manageable, and repeatable way.

Top Recommendations for IAM from Our AWS Heroes – Part 2: The Visual Editor and Federation

AWS Identity and Access Management (IAM)‘s 10th anniversary continues with Part 2 of our blog series. Writing an IAM policy can be tricky, but don’t feel overwhelmed. Learn how the IAM visual editor helps you create policies by providing helpful documentation and the correct syntax. You’ll also learn why you should use federation due to the short-term credentials made possible by IAM roles. More tips like these can be found throughout our 4-part blog series.