In this post, Keegan and I will show how sellers are informed of security issues found on your products, methods of keeping your products up to date, and best practices when it comes to maintaining and improving the security of your catalog in AWS Marketplace.
In this post, Juston and I will show you how to make an automated data access report using the DataSunrise application for Aurora PostgreSQL-Compatible Edition.
In this post, Shiva, Muffadal, and I show you how to use the Cisco Edge Security Blueprint for AWS Control Tower Account Factory Customization. Using this solution, you can provision customized AWS accounts in AWS Control Tower that are enabled for network security inspection use cases with Cisco Secure Firewall Threat Defense Virtual (FTDv).
You have an awesome application running on AWS, and now your customers and partners want a private network connection to it. Great! Except for one problem: their site is using the same private IP address range as the one in your Amazon Virtual Private Cloud (Amazon VPC). This will prevent any communication until you resolve […]
As you shift your workloads to AWS, you must ensure that access to them is seamless, secure, and optimized for your employees, remote workers, and contractors. When looking at workload access, you should consider the type of user, whether the access is from a managed or unmanaged device, and whether the location is well known […]
This blog post was written by Kanishk Mahajan, ISV Solutions Architecture Lead at AWS and guest author Maya Neelakandhan, Head of Customer Success at CloudKnox. Introduction Permissions management in AWS empowers security and cloud infrastructure teams to protect your cloud resources from misuse of identity permissions. Cloud security requires continuous enforcement of least-privilege policies across […]
In this blog post, I show you how to configure cloudtamer.io for your AWS Control Tower managed environment. Using this solution you can seamlessly register accounts from both cloudtamer.io and AWS.
Automating FortiGate Next Generation Firewall Intrusion Prevention using AWS CloudFormation AWS CloudFormation provides a way for you to create templates that can help you automatically launch resources. This helps you eliminate manual tasks such as configuring route tables or assigning elastic IP addresses (EIP) to instances. In this blog post, I show how to help […]
The human resource needs of cybersecurity can cause organizational strain. Organizations have access to plenty of security tools but might not have enough skilled personnel to maximize their use. They might also have difficulty contending with the growing number of security events that need to be investigated every day. There are also financial and technical […]
AWS Marketplace now offers a new category of solutions to help you integrate third-party software with AWS Control Tower. AWS Control Tower provides a way to set up and govern a new, secure, multi-account AWS environment. It is based on best practices established through the experience working with thousands of enterprises as they move to […]