The New AWS Security Blog
The AWS team works non-stop to improve the security of our services. As you can see from the timeline below, many of our recent releases have made it easier for you to secure your cloud resources.
The new AWS Security Blog is your one-stop shop for best practices, how-to guides, customer stories, and more. Like the existing Java, Mobile, and Ruby blogs, the AWS Security Blog focuses on a single topic. We are thinking about creating other blogs of this type; please leave a comment to suggest a topic.
Here’s a timeline of the most recent security and compliance releases:
The following table provides more detail:
|Security or Compliance Event
|IAM Policy Variables
|Create policies containing variables that will be dynamically evaluated using context from the authenticated user’s session.
|Use dedicated Hardware Security Module (HSM) appliances within the AWS Cloud.
|VPC by default
|EC2 instances will be launched in a VPC for new customers.
|Cross-account API access using IAM roles
|Delegate temporary API access to AWS services and resources within your AWS account without having to share long-term security credentials.
|MFA-protected API access
|Enforce MFA authentication for AWS service APIs via AWS Identity and Access Management (IAM) policies.
|Simplifies the process for your applications to secure access AWS service APIs from EC2 instances.
|AWS Trusted Advisor
|Self-service access to proactive alerts that identify opportunities to save money, improve system performance, or close security gaps.
|Compliance Milestone: SOC 1, Type 2 Report
|Support for virtual MFA devices
|Use your existing smartphone, tablet, or computer running any application that supports the open TOTP standard.
|S3 server-side encryption
|Request encrypted storage when you store a new object in Amazon S3 or when you copy an existing object.
|Compliance Milestone: FISMA Moderate
|AWS Region designed to allow US government agencies and customers to move more sensitive workloads into the cloud by addressing their specific regulatory and compliance requirements.
|AWS Direct Connect
|Enables you to bypass the public Internet when connecting to AWS.
|Compliance Milestone: PCI DSS Level 1
|Compliance Milestone: ISO 27001
|AWS Identity and Access Management (IAM)
|Enables you to securely control access to AWS services and resources for your users.
|Compliance Milestone: SAS70 Type II Audit
|AWS Multi-Factor Authentication (MFA)
|Provides an extra level of security that you can apply to your AWS environment.
|Provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define.
|Compliance milestone: whitepaper for HIPAA-compliant data applications
Check out the AWS Security Blog and let us know what you think.