AWS Security Blog

A New Guide to Banking Regulations and Guidelines in India

The AWS User Guide to Banking Regulations and Guidelines in India was published in December 2017 and includes information that can help banks regulated by the Reserve Bank of India (RBI) assess how to implement an appropriate information security, risk management, and governance program in the AWS Cloud. The guide focuses on the following key […]

Validate Your IT Security Expertise with the New AWS Certified Security – Specialty Beta Exam

If you are an experienced cloud security professional, you can demonstrate and validate your expertise with the new AWS Certified Security – Specialty beta exam. This exam allows you to demonstrate your knowledge of incident response, logging and monitoring, infrastructure security, identity and access management, and data protection. Register today – this beta exam will […]

Two New Documents to Help You Navigate Australian Prudential Regulation Authority (APRA) Requirements

Note from May 28, 2020: The features and services described in this post have changed since the post was published and the procedures described might be out of date and no longer accurate. Please see https://aws.amazon.com/blogs/security/new-guidance-navigate-australian-prudential-regulation-authority-requirements/ for the most recent information. AWS has published two new documents to help Financial Services customers understand how to […]

The Top 10 Most Downloaded AWS Security and Compliance Documents in 2017

July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]

How to Set Up Continuous Golden AMI Vulnerability Assessments with Amazon Inspector

As companies mature in their cloud journey, they implement layered security capabilities and practices in their cloud architectures. One such practice is to continually assess golden Amazon Machine Images (AMIs) for security vulnerabilities. AMIs provide the information required to launch an Amazon EC2 instance, which is a virtual server in the AWS Cloud. A golden […]