AWS Partner Network (APN) Blog

Tag: AWS IAM

TechMahindra-APN-Blog-072722

How Tech Mahindra’s InfoWise Accelerates the AWS Cloud Journey Through Data Modernization

Lack of a modernization strategy can result in unwanted downtime, excess investment, poor quality service, and dead-weight assets into the modernized platform. This post talks about how InfoWise, a Tech Mahindra solution, accelerates the first two stages of the cloud data migration and modernization journey: search and discover and plan and strategy. InfoWise also helps recommend the migration priority by running various dependency intelligence across all the metadata objects.

Build and Deploy a Secure Container Image with AWS and Snyk

Learn how to build a Java application in a Docker container and push the container image to Amazon ECR orchestrated by AWS CodePipeline. We’ll use Snyk to scan your code, build a container image, and display the results in both Snyk and Amazon ECR. We’ll also show you how Amazon Inspector utilizes Snyk open source to provide insight into your software security vulnerabilities. All of this functionality is available from the AWS Management Console.

Deloitte-APN-Blog-072622

Managing Cybersecurity Risks with the Next Generation of Managed Security Services  

Both AWS and Deloitte understand that a customer’s cloud journey is different and have their own set of requirements. This is why Deloitte’s Cyber CMS solution provides a wide range of options for businesses to choose from to create the right package for them. Learn how Cyber CMS can help organizations become more trustworthy, resilient, and secure through proactive management of cyber risks.

How Multi-Tenancy with AWS Transfer Family is a Cost-Effective Solution

AWS Transfer Family provides SFTP, FTPS, and/or FTP access to Amazon S3 or Amazon Amazon EFS. It does that by providing a secure, highly available, and scalable server endpoint. You pay for the time this endpoint is enabled, and for data transfer (upload and download). Learn how this makes a multi-tenant setup where an endpoint is shared between different users (or applications), a more cost-efficient solution than having dedicated endpoints.

T-Systems-APN-Blog-071522

How T-Systems Enabled AWS Config at Scale for Deutsche Telekom IT’s Landing Zone

Learn how T-Systems has enabled AWS Config at scale on Deutsche Telekom IT’s AWS landing zone, which is a brownfield environment with more than 600 AWS accounts. AWS Config is a governance and compliance service that enables you to assess, audit, and evaluate the configurations of your resources. The main motivator for Deutsche Telekom IT using AWS Config is that developing compliance checks using custom tools was time consuming, unscalable, and came with a large operational overhead.

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

Storm-Reply-APN-Blog-063022

Developing Data-Driven IoT Business Models for Sustainability with Storm Reply

Firms spend substantial efforts to identify and collect quality data streams from different sources. However, identifying and interpreting energy, water, or gas usage patterns and consumption types is sometimes insufficient. In this post, you’ll learn how Storm Reply, combining industry knowledge with its expertise in the development of data analytics platforms in AWS, can help customers in the design, development, and maintenance of secure serverless IoT big data platforms with a focus on sustainability.

Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax

Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.

Cloud-Storage-Security-APN-Blog-061722-1

Integrating Amazon S3 Malware Scanning into Your Application Workflow with Cloud Storage Security

A wide range of solutions ingest data, store it in Amazon S3 buckets, and share it with downstream users. Often, the ingested data is coming from third-party sources, opening the door to potentially malicious files. This post explores how Antivirus for Amazon S3 by Cloud Storage Security allows you to quickly and easily deploy a multi-engine anti-malware scanning solution to manage file protection and malware findings.

SaaS-S3-Data-Partitioning-APN-Blog-061422

Partitioning and Isolating Multi-Tenant SaaS Data with Amazon S3

Many SaaS applications store multi-tenant data with Amazon S3. Learn about the various strategies that can be applied when partitioning tenant data with S3, and explore the considerations that may influence how and when you apply these mechanisms in your own solution. See how this influences tenant isolation and the accessibility of S3 objects, and dive deep on tenant activity and cost tracking, lifecycle management for objects, and additional bucket security configurations.