AWS Partner Network (APN) Blog

Tag: Compliance

Sensitive-Data-FTR-SaaS-1

Mitigating Sensitive Data-Related Risks via Foundational Technical Review (FTR) for SaaS Solutions

Most SaaS solutions which undergo an AWS Foundational Technical Review (FTR) ingest, manage, and store sensitive data. The FTR is a review based on the AWS Well-Architected Framework and enables AWS Partners to identify and remediate risks in their solutions. Learn how to manage and secure sensitive data within their SaaS solutions with a focus on addressing requirements related to PII or PHI requirements in the Foundational Technical Review.

DataMasque-APN-Blog-071222

How to Mask Sensitive Data on AWS Using DataMasque

DataMasque is an AWS Partner that removes sensitive data from the databases and replaces it with realistic and functional masked values that enable effective development, testing, and analytics. This empowers AWS customers to do secure deployments in testing or non-production environments while mitigating the data breach security risks and allowing relevant teams to focus on development and testing of their applications without hinderance.

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax

Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.

VGS-APN-Blog-060622

A FinTech Roadmap to Data Security and Compliance with VGS and AWS

To meet compliance like PCI-DSS, SOC2, and HIPAA, a customer typically has to change their architecture and workload, which can take significant time, money, and effort. With Very Good Security (VGS), customers retain full control over their data while offloading information security burdens, transferring the risk of a data breach, and fast-tracking compliance. VGS acts as a secure layer between your company and sensitive data.

nOps-AWS-Partners

Automating Best Practices with nOps and the AWS Well-Architected Framework

An AWS Well-Architected Review is the optimal way to measure your architecture against AWS best practices and to improve your architecture by addressing critical issues. Learn how the nOps cloud management platform allows customers and consulting partners to have a more accurate view of AWS service configurations in alignment with the Well-Architected Framework. We’ll also explore how nOps enables more prescriptive and real-time insights to continuously improve the architecture over time.

IBM-AWS-Partners-2

Enabling Security and Compliance in an AWS-Based Big Data Analytics Platform Using Cattle Server Automation and IaC

This post describes a solution created by IBM during the migration of a big data and analytics platform for one of the top 10 banks worldwide. The primary drivers were cost efficiency, business agility, and performance. The “pet to cattle” concept was applied to this solution to transform the legacy high availability disaster recovery solution to a more robust and cost-effective cattle-based solution through the use of AWS-native services.

Valtix-AWS-Partners

Network Transformation with AWS and Valtix for Workload Segmentation and Compliance

As a multi-cloud network security platform, Valtix enables teams to meet the most stringent security requirements in a cloud-first and simple way. Learn about the transformation of network security use case leveraging Valtix for segmentation of workloads and to help meet compliance requirements. We’ll also walk through an example of how to enforce consistent security across tens and hundreds of VPCs spanning multiple regions and AWS accounts.

Security and Compliance at Scale with CloudHealth Secure State

Security is the highest priority for AWS, which works closely with industry-leading partners such as CloudHealth by VMware to build security solutions for customers like CloudHealth Secure State (CHSS). Learn how you can set up CHSS projects, suppress rules and alerts, find misconfigurations through CHSS Explore, and set up remediation jobs all built on CloudHealth’s unified security monitoring approach for AWS.

Authority to Operate on AWS-1

Announcing the Authority to Operate on AWS Program’s Global Security and Compliance Acceleration Initiative

Recognizing that AWS maintains customers across the world, we have launched the Global Security and Compliance Acceleration (GSCA) initiative under the Authority to Operate (ATO) on AWS Program banner. The purpose of this new initiative is to add a global focus to our existing ATO on AWS support mechanisms, with an emphasis on recruiting qualified international AWS Partners to operate and support customers in differing regions.