Networking & Content Delivery

Tag: Security

How to integrate third-party firewall appliances into an AWS environment

Many customers have requirements to leverage existing on-premises firewall technology or want to get started in AWS by using their existing firewall expertise. A large number of firewall vendors have versions of their software in the AWS Marketplace that work in either bring-your-own-license (BYOL) or pay-as-you-go pricing models. This makes it easy to get up and running […]

Read More

Creating a single internet exit point from multiple VPCs Using AWS Transit Gateway

In this post, we show you how to centralize outbound internet traffic from many VPCs without compromising VPC isolation. Using AWS Transit Gateway, you can configure a single VPC with multiple NAT gateways to consolidate outbound traffic for numerous VPCs. At the same time, you can use multiple route tables within the transit gateway to […]

Read More

Ten years of securing, accelerating, and scaling apps around the world – Amazon CloudFront marks its 10th anniversary.

First of all, thank you to each and every one of you who use the Amazon CloudFront service every day. CloudFront’s growth and evolution over the past decade would not have been possible without your feedback—input that has shaped the service since day one. We are excited to have just celebrated our 10-year anniversary of […]

Read More

How to use AWS PrivateLink to secure and scale web filtering using explicit proxy

Many customers use web filtering proxy solutions to monitor and control web traffic from their VPCs. When you have many accounts and VPCs, you will need to deploy multiple stacks of these solutions. This increases the complexity and overhead of managing these solutions. By centralizing the web filtering proxy service, you can easily and securely […]

Read More

CloudFront now Supports ECDSA Certificates for HTTPS Connections to Origins

See how you can now use Amazon CloudFront to negotiate HTTPS connections to origins using Elliptic Curve Digital Signature Algorithm (ECDSA). ECDSA uses smaller keys that are faster, yet, just as secure, as the older RSA algorithm. The smaller keys will also increase the number of TLS handshakes that your origins can process per second, thereby saving compute cycles and reducing your cost of cryptography.

Read More

Authorization@Edge – How to Use Lambda@Edge and JSON Web Tokens to Enhance Web Application Security

Authorization, the function of specifying access rights to resources is often required to help protect restricted content in web applications. This post will show you how to implement a serverless authorization of viewers using Amazon CloudFront, Lambda@Edge and Amazon Cognito without modifying your origin resources.

Read More