AWS Partner Network (APN) Blog
Tag: Security
Enabling Digital Transformation with Secure Team Collaboration from Symphony
Symphony was built by a consortium of 15 leading global financial institutions to solve the critical issue of how to collaborate while remaining secure and compliant. This initial goal has lead Symphony to develop a platform that’s changing the way companies do business in critical industries like financial services. Its open APIs, integrations, bots, and workflows are helping to create a more democratic ecosystem for innovation, within and beyond financial services.
F5 Launches First SaaS Service Exclusively on AWS with Support of AWS SaaS Factory
F5 Cloud Services is a set of enterprise-grade application delivery and security SaaS services that are optimized for cloud-native applications and microservice environments. The AWS SaaS Factory team sat down with Craig Kitterman, Sr. Director of Product Management at F5 Cloud Services, and Yaniv Shemesh, Chief Architect at F5 Cloud Services, to learn about what they’re launching and how it benefits customers.
Say Hello to 26 New AWS Competency, MSP, and Service Delivery Partners Added in February
We are excited to highlight 26 APN Partners that received new designations in February for our global AWS Competency, AWS Managed Service Provider (MSP), and AWS Service Delivery programs. These designations span workload, solution, and industry, and help AWS customers identify top APN Partners that can deliver on core business objectives. APN Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.
Control Access to Your Data with Slack Enterprise Key Management and AWS KMS
Slack has become a vital tool for collaboration for teams and companies around the world, and we are excited about the launch of Slack Enterprise Key Management (EKM). By integrating with AWS Key Management Service (KMS) in a customer’s AWS account, Slack EKM gives you tighter control over access to data that is stored in Slack. With Slack EKM, you can create a Customer Master Key that always stays under your control. Then, using key policies, you grant Slack access to use your CMK to generate and decrypt data keys.
Use Amazon OpenSearch Service with Kibana for Identity Federation – Auth0
With the 2018 release of Amazon OpenSearch Service integration with Amazon Cognito, you can now enable corporate users to access OpenSearch with Kibana using your corporate directory credentials through identity federation. In this post, we share a step-by-step integration of Auth0 and Amazon Cognito. With Amazon Cognito User Pool, you can extend your directory so Auth0 users are able to log in to Kibana with the same security credentials.
Creating a Golden AMI Pipeline Integrated with Qualys for Vulnerability Assessments
The golden AMI pipeline addresses challenges faced by customer cloud teams. It describes a method for providing a repeatable, scalable, and approved application stack factory that increases innovation velocity, reduces effort, and increases the chief information security officer’s confidence that IT teams are compliant in their cloud deployments. In this post, we explored how to set up a golden AMI creation pipeline with a combination of AWS services, as well as the Qualys Scanner available on AWS Marketplace.
Using Amazon OpenSearch Service with Kibana for Identity Federation – Active Directory
With the 2018 release of Amazon OpenSearch Service integration with Amazon Cognito, you can now enable corporate users to access OpenSearch with Kibana using your corporate directory credentials through identity federation. In this post, we share a step-by-step integration of Active Directory (AD) and Amazon Cognito. With Amazon Cognito User Pool, you can extend your directory so AD users are able to log in to Kibana with the same security credentials.
How to Securely Access Amazon Virtual Private Clouds Using Zscaler Private Access
When you are migrating private applications to AWS, how your users and administrators will access them needs to be considered. VPNs do not provide the granular control desired by a Zero Trust approach, as users have access to any resource on the network and not just specific resources they are granted access to. Learn how you can implement a Zero Trust approach to access applications hosted on AWS using Zscaler Private Access (ZPA).
How to Centralize SSH Key Management with Userify and AWS CloudFormation
As teams begin to build their architecture on AWS, the question often arises about how to manage access control to all of their instances. Userify solves this problem quickly and easily by providing Userify Cloud or, for self-hosting, a single instance or multi-Availability Zone cluster that runs in your Amazon VPC. Userify Cloud is a fully managed service that can be used across your VPCs and AWS accounts with no installation needed.
Building Foundational Security and Compliance Capabilities in 10 Minutes with the CIS AWS Quick Start
The Center for Internet Security (CIS) Benchmark on AWS Quick Start helps you to make securing and monitoring resources easier to implement and understand. The Quick Start was developed by Accenture, an APN Premier Partner and Managed Service Provider (MSP) with the AWS Security Competency. We also created a new video offering step-by-step best practice guidance on how to deploy the CIS Benchmark Quick Start and build foundational security capabilities into your account, in just 10 minutes.








