AWS Partner Network (APN) Blog

Tag: Identity and Access Management

AWS-SaaS-Factory-1

Using Amazon SQS in a Multi-Tenant SaaS Solution

Modern applications often rely on queuing for service integrations, batch processing, or as part of workflow orchestration. Queues are key to adding scale and resiliency to your environment. This is especially true in software-as-a-service (SaaS) environments. Explore some of the common scenarios used when building SaaS solutions with Amazon Simple Queue Service (SQS), and learn how data isolation, scalability, and compliance requirements might influence the queuing model you select.

Read More
APN-Ambassadors-1

Provisioning a Virtual Private Cloud at Scale with AWS CDK

Infrastructure as code is one of the most important concepts used with cloud solutions, and AWS CloudFormation enables IaC by deploying stacks and provisioning resources on AWS using JSON or YAML files called templates. APN Ambassador Francois Rouxel from Slalom will show you how to create a hundred VPCs in one AWS region without providing any parameters, and how to easily establish a peering connection between two of them within a single line of code.

Read More

Amazon Fraud Detector Can Accelerate How AI is Embedded in Your Business

Online fraud is estimated to be costing businesses billions of dollars a year. As Fraudsters evolve new behaviors to get around preventive measures, businesses need a strategy that enables them to be responsive to new problems as they emerge. Learn how Inawisdom uses Amazon Fraud Detector to accelerate how AI can be embedded in a company’s strategy. What makes machine learning more flexible is its focus on identifying general patterns by looking at lots of examples.

Read More
ClearDATA-AWS-Partners

How ClearDATA Enforces Data Locality with AWS IAM Permission Boundaries

For healthcare organizations bound by regulations that require privacy, security, and compliance protections for sensitive healthcare data, ClearDATA provides the peace of mind of automation-forward technology and industry-leading, HITRUST-certified, healthcare-exclusive expertise. Learn how ClearDATA Comply uses the IAM permission boundary feature to automate restricting access to specific AWS regions.

Read More
AWS-SaaS-Factory-1

Explore SaaS Tenant Isolation Strategies in New SaaS Whitepaper

Tenant isolation is fundamental to the design and development of SaaS systems, enabling providers to reassure customers their resources cannot be accessed by other tenants. While the importance of isolation is well understood, the strategies for realizing a robust isolation model vary significantly. Learn how our new SaaS Tenant Isolation Strategies whitepaper assembles a collection of best practices and considerations that often shape your approach to implementing isolation in a SaaS environment.

Read More
AWS-SaaS-Factory-1

Isolating SaaS Tenants with Dynamically Generated IAM Policies

Many SaaS organizations leverage AWS Identity and Access Management (IAM) to define a series of policies and roles that can be used to ensure tenants are not allowed to cross tenant boundaries when accessing resources. To make this work, you have to create separate policies for each tenant which can create an explosion of tenant policies that push the account limits of IAM. Learn how dynamic policy generation creates a more scalable and manageable isolation experience.

Read More
Cisco-AWS-Partners

How to Automate and Secure Branch Office Connectivity to AWS with Cisco SD-WAN

Cisco and AWS make it easy to automate and view end-to-end SD-WAN connectivity through a single, unified, automated interface. The Cisco vManage 20.3 release helps customers simplify and automate their global networks on AWS. Within minutes, customers can securely deploy their SD-WAN networks by seamlessly utilizing AWS as the global backbone for their underlay network for their branch-to-cloud and branch-to-branch traffic.

Read More
CloudBees-AWS-Partners

Modernize Your CI/CD Pipeline Using Jenkins X with Amazon EKS

At a time when software delivery speed matters more than ever, teams need a toolchain that allows them to build and deploy rapidly while realizing the cost savings of open source technologies. CloudBees is a provider of Jenkins-based CI/CD solutions (Jenkins X) that meet the security, scalability, and manageability needs of on-premises and cloud environments. Learn how to combine Amazon EKS with Jenkins X to establish a Kubernetes-native CI/CD process.

Read More
Machine Learning-4

Using Fewer Resources to Run Deep Learning Inference on Intel FPGA Edge Devices

Inference is an important stage of machine learning pipelines that deliver insights to end users from trained neural network models. These models are deployed to perform predictive tasks like image classification, object detection, and semantic segmentation. However, constraints can make implementing inference at scale on edge devices such as IoT controllers and gateways challenging. Learn how to train and convert a neural network model for image classification to an edge-optimized binary for Intel FPGA hardware.

Read More

Easily Delegate Responsibilities Using AWS Permissions Boundaries and cloudtamer.io

Permissions boundaries allow admins to delegate permissions to users so they can create new AWS service roles without elevating their own permissions. This removes the need for admins to field requests for these role creations and promotes self-service for users. The ultimate goal is to remove blockers for enhanced productivity. Learn how to pair permissions boundaries with cloudtamer.io for increased automation and delegation.

Read More