AWS Partner Network (APN) Blog

Tag: Security

Enabling Digital Transformation with Secure Team Collaboration from Symphony

Symphony was built by a consortium of 15 leading global financial institutions to solve the critical issue of how to collaborate while remaining secure and compliant. This initial goal has lead Symphony to develop a platform that’s changing the way companies do business in critical industries like financial services. Its open APIs, integrations, bots, and workflows are helping to create a more democratic ecosystem for innovation, within and beyond financial services.

SaaS Factory_feature

F5 Launches First SaaS Service Exclusively on AWS with Support of AWS SaaS Factory

F5 Cloud Services is a set of enterprise-grade application delivery and security SaaS services that are optimized for cloud-native applications and microservice environments. The AWS SaaS Factory team sat down with Craig Kitterman, Sr. Director of Product Management at F5 Cloud Services, and Yaniv Shemesh, Chief Architect at F5 Cloud Services, to learn about what they’re launching and how it benefits customers.

Say Hello

Say Hello to 26 New AWS Competency, MSP, and Service Delivery Partners Added in February

We are excited to highlight 26 APN Partners that received new designations in February for our global AWS Competency, AWS Managed Service Provider (MSP), and AWS Service Delivery programs. These designations span workload, solution, and industry, and help AWS customers identify top APN Partners that can deliver on core business objectives. APN Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Cloud Management Tools-1

Control Access to Your Data with Slack Enterprise Key Management and AWS KMS

Slack has become a vital tool for collaboration for teams and companies around the world, and we are excited about the launch of Slack Enterprise Key Management (EKM). By integrating with AWS Key Management Service (KMS) in a customer’s AWS account, Slack EKM gives you tighter control over access to data that is stored in Slack. With Slack EKM, you can create a Customer Master Key that always stays under your control. Then, using key policies, you grant Slack access to use your CMK to generate and decrypt data keys.

Cloud Anything-14

Use Amazon OpenSearch Service with Kibana for Identity Federation – Auth0

With the 2018 release of Amazon OpenSearch Service integration with Amazon Cognito, you can now enable corporate users to access OpenSearch with Kibana using your corporate directory credentials through identity federation. In this post, we share a step-by-step integration of Auth0 and Amazon Cognito. With Amazon Cognito User Pool, you can extend your directory so Auth0 users are able to log in to Kibana with the same security credentials.

AWS Security

Creating a Golden AMI Pipeline Integrated with Qualys for Vulnerability Assessments

The golden AMI pipeline addresses challenges faced by customer cloud teams. It describes a method for providing a repeatable, scalable, and approved application stack factory that increases innovation velocity, reduces effort, and increases the chief information security officer’s confidence that IT teams are compliant in their cloud deployments. In this post, we explored how to set up a golden AMI creation pipeline with a combination of AWS services, as well as the Qualys Scanner available on AWS Marketplace.

Cloud Anything-14

Using Amazon OpenSearch Service with Kibana for Identity Federation – Active Directory

With the 2018 release of Amazon OpenSearch Service integration with Amazon Cognito, you can now enable corporate users to access OpenSearch with Kibana using your corporate directory credentials through identity federation. In this post, we share a step-by-step integration of Active Directory (AD) and Amazon Cognito. With Amazon Cognito User Pool, you can extend your directory so AD users are able to log in to Kibana with the same security credentials.

Zscaler-AWS-Partners

How to Securely Access Amazon Virtual Private Clouds Using Zscaler Private Access

When you are migrating private applications to AWS, how your users and administrators will access them needs to be considered. VPNs do not provide the granular control desired by a Zero Trust approach, as users have access to any resource on the network and not just specific resources they are granted access to. Learn how you can implement a Zero Trust approach to access applications hosted on AWS using Zscaler Private Access (ZPA).

Security-2

How to Centralize SSH Key Management with Userify and AWS CloudFormation

As teams begin to build their architecture on AWS, the question often arises about how to manage access control to all of their instances. Userify solves this problem quickly and easily by providing Userify Cloud or, for self-hosting, a single instance or multi-Availability Zone cluster that runs in your Amazon VPC. Userify Cloud is a fully managed service that can be used across your VPCs and AWS accounts with no installation needed.

Quick Starts_featured-2

Building Foundational Security and Compliance Capabilities in 10 Minutes with the CIS AWS Quick Start

The Center for Internet Security (CIS) Benchmark on AWS Quick Start helps you to make securing and monitoring resources easier to implement and understand. The Quick Start was developed by Accenture, an APN Premier Partner and Managed Service Provider (MSP) with the AWS Security Competency. We also created a new video offering step-by-step best practice guidance on how to deploy the CIS Benchmark Quick Start and build foundational security capabilities into your account, in just 10 minutes.