AWS Public Sector Blog

Category: AWS Secrets Manager

AWS branded background design with text overlay that says "Cloud incident response at UNSW with digital forensics powered by AWS"

Cloud incident response at UNSW with digital forensics powered by AWS

In the digital age, universities face increasing cyber threats that put valuable data at risk. The University of New South Wales (UNSW) is taking proactive measures to address this growing concern. Read this blog post to learn how UNSW is collaborating with Amazon Web Services (AWS) to modernize its IT infrastructure and bolster cybersecurity defenses as part of its cloud transformation program.

lock over computer chip

Delegated authentication using OAuth: A case study using Spotify and AWS

Cloud-based technologies allow organizations like governments to build a new application on existing services on the internet that offers open and documented APIs to deliver reliable data. These services have an authentication model so that new users verify their identity before accessing, even if it’s offered at no cost. There are three components in this scenario: a service provider, an end user, and an application that needs to access user data. The key technology here is OAuth. OAuth is a standard that enables access delegation.