AWS Partner Network (APN) Blog

Tag: Center for Internet Security

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

WNS-APN-Blog-070722

How WNS Document Verification Solution Leverages AWS to Power Auditor Telemetry

To ensure the safety of travelers and give them renewed confidence in flying, the air travel industry has introduced processes to obtain and validate COVID-19 vaccination information before journey commencement at the origin airport. In this post, we discuss how the WNS Document Verification Solution leverages Amazon Web Services (AWS) to capture auditor telemetry for enabling increased auditor productivity.

Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax

Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.

HCL-AWS-Partners-1

HCL Augmented Network Automation Platform Delivers Scalable, Intelligent Cellular Network Deployment

The HCL Augmented Network Automation (ANA) Platform takes self-organizing networks to the next generation. It features a closed-loop network automation environment that supports multi-vendor, multi-technology cellular network deployments. Learn how HCL ANA on AWS enables telecom service providers to simplify network management complexity and improve end-customer satisfaction, as AI-based automation and operation is becoming a crucial component for all tiers of cellular networks.

Kyndryl-AWS-Partners

Integrating AWS Security Hub, IBM Netcool, and ServiceNow to Secure Large Client Deployments

Customers using cloud resources on AWS can safeguard sensitive IT systems and data by complying with the industry-recognized CIS AWS Foundations Benchmark, among other best practices defined by AWS security experts. This post explains how to get visibility of your cloud security posture when building secure multi-account, multi-region AWS deployments. Kyndryl is an IT infrastructure services provider that designs, builds, manages, and modernizes the information systems the world depends on every day.

Atos-AWS-Partners

Driving Business Innovation and Delivering Cloud Security with Digital Cloud Services from Atos

Digital Cloud Services (DCS) is a fully managed AWS landing zone-as-a-service from Atos, and the DCS solution offers a managed landing zone platform with enterprise-grade security. It provides customers with the ideal environment to start or continue their business transformation, at pace and scale in a self-service manner. With DCS, customers are safe in the knowledge the underlying platform is built to CIS benchmarks and AWS Well-Architected Framework standards.

FTR-1

New Foundational Technical Review Process for Partner Hosted Solutions

The AWS Foundational Technical Review (FTR) helps identify and mitigate technical risks in solutions built by AWS ISV Partners. The FTR focuses on a subset of AWS Well-Architected best practices and defines objective criteria for each requirement. In October 2021, we updated the FTR process for Partner Hosted solutions to make it faster, easier, and more accurate than before. In this post, learn how the updated FTR process works, benefits of the new process, and how you can get started.

CIS-AWS-Partners

How to Decide Between Building or Buying a CIS Hardened Image

The Center for Internet Security (CIS) is responsible for the CIS Controls and CIS Benchmarks, which are globally recognized best practices for securing IT systems and data. The implementation of these can help harden systems through various means, whether it be disabling unnecessary ports or eliminating unneeded services. Purchasing a pre-hardened image is a great option, especially since you are ensured compliance with the CIS Benchmark, and deploying it would not require much maintenance on your end.

Sysdig-AWS-Partners

Unifying Threat Detection for Cloud and Containers to Reduce Risk Using Sysdig

Implementing effective threat detection for applications in the cloud requires visibility into all aspects of your infrastructure and workloads. By taking advantage of AWS services, you’re freed to focus on the applications that drive your business. Security in the cloud is a shared responsibility between AWS and the customer, however, and Sysdig’s cloud security platform helps you follow security best practices and simplify the work of securing your AWS account and workloads.

Authority to Operate on AWS-1

Authority to Operate on AWS Program Helps Public Sector Partners Accelerate Security and Compliance for Customers

Security and compliance are primary considerations for many AWS customers as they begin their cloud journey. Public sector customers, in particular, face obstacles and challenges using commercially available solutions that may not have an Authority to Operate (ATO). To help customers overcome these obstacles, the Authority to Operate on AWS program provides resources to solution providers who need assistance pursuing a compliance authorization.