AWS Partner Network (APN) Blog

Tag: Identity and Access Management

ClearScale-APN-Blog-080222

PBS Provides Tailored Experiences for Viewers with Amazon Personalize

Like many of today’s leading media and streaming platforms, PBS wanted to take its overall user experience to the next level. That’s why PBS approached AWS Premier Tier Consulting Partner ClearScale, a leader in machine learning. ClearScale came up with a detailed roadmap for tackling PBS’s recommendation system project that included data operations, MLOps, and demonstrational user interface. Together, PBS and ClearScale decided to move forward with an AWS-powered solution on top of Amazon Personalize.

Read More

Build and Deploy a Secure Container Image with AWS and Snyk

Learn how to build a Java application in a Docker container and push the container image to Amazon ECR orchestrated by AWS CodePipeline. We’ll use Snyk to scan your code, build a container image, and display the results in both Snyk and Amazon ECR. We’ll also show you how Amazon Inspector utilizes Snyk open source to provide insight into your software security vulnerabilities. All of this functionality is available from the AWS Management Console.

Read More
Deloitte-APN-Blog-072622

Managing Cybersecurity Risks with the Next Generation of Managed Security Services  

Both AWS and Deloitte understand that a customer’s cloud journey is different and have their own set of requirements. This is why Deloitte’s Cyber CMS solution provides a wide range of options for businesses to choose from to create the right package for them. Learn how Cyber CMS can help organizations become more trustworthy, resilient, and secure through proactive management of cyber risks.

Read More

How Multi-Tenancy with AWS Transfer Family is a Cost-Effective Solution

AWS Transfer Family provides SFTP, FTPS, and/or FTP access to Amazon S3 or Amazon Amazon EFS. It does that by providing a secure, highly available, and scalable server endpoint. You pay for the time this endpoint is enabled, and for data transfer (upload and download). Learn how this makes a multi-tenant setup where an endpoint is shared between different users (or applications), a more cost-efficient solution than having dedicated endpoints.

Read More
T-Systems-APN-Blog-071522

How T-Systems Enabled AWS Config at Scale for Deutsche Telekom IT’s Landing Zone

Learn how T-Systems has enabled AWS Config at scale on Deutsche Telekom IT’s AWS landing zone, which is a brownfield environment with more than 600 AWS accounts. AWS Config is a governance and compliance service that enables you to assess, audit, and evaluate the configurations of your resources. The main motivator for Deutsche Telekom IT using AWS Config is that developing compliance checks using custom tools was time consuming, unscalable, and came with a large operational overhead.

Read More

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

Read More

Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax

Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.

Read More
SaaS-S3-Data-Partitioning-APN-Blog-061422

Partitioning and Isolating Multi-Tenant SaaS Data with Amazon S3

Many SaaS applications store multi-tenant data with Amazon S3. Learn about the various strategies that can be applied when partitioning tenant data with S3, and explore the considerations that may influence how and when you apply these mechanisms in your own solution. See how this influences tenant isolation and the accessibility of S3 objects, and dive deep on tenant activity and cost tracking, lifecycle management for objects, and additional bucket security configurations.

Read More
Ahana-APN-Blog-050222-1

Securely Querying Your Data Lake with Ahana Presto and AWS Lake Formation

Ahana provides a fully managed and easy-to-use service for running Presto on AWS, and customers like Metropolis use Ahana to query data in their Amazon S3-based data lake for business intelligence, ad-hoc analytics, and reporting. Learn how Metropolis uses AWS Lake Formation and Ahana to build a data lake that allows their analysts and data scientists to develop a simple, hands-free parking experience for their customers.

Read More
LTI-APN-Blog-042622-2

Implementing Data Mesh Using LTI’s Canvas Scarlet Framework on AWS

As data grows at an exponential rate both in volume and velocity, it becomes important for organizations to carve out a strategy to store data in appropriate locations with the correct safeguards to address data access and privacy concerns. Learn how organizations can transform their data landscape into a more controlled, flexible, and secure landscape using LTI’s Canvas Scarlet Data Mesh framework built on AWS to meet the data challenges an organization faces today.

Read More