AWS Security Blog
How to Manage Identities in Simple AD Directories
As I said in yesterday’s blog post, How to Migrate Your Microsoft Active Directory Users to Simple AD, AWS Directory Service allows you to create a standalone, highly available AWS-managed directory called Simple AD in a matter of minutes. With Simple AD, you can centrally manage user accounts and group memberships for Amazon EC2 instances […]
How to Migrate Your Microsoft Active Directory Users to Simple AD or AWS Managed Microsoft AD
July 21, 2020: We’ve updated this post to include AWS Managed Microsoft AD, as well as Simple AD. AWS Directory Service allows you to create a standalone, highly available AWS-managed directory called Simple AD in a matter of minutes. With Simple AD, you can centrally manage user accounts and group memberships for Amazon EC2 instances […]
Register for and Attend This August 20 Webinar–Best Practices for DDoS Resiliency
As part of the AWS Webinar Series, AWS will present Best Practices for DDoS Resiliency on Thursday, August 20. This webinar will start at 10:30 A.M. and end at 11:30 A.M. Pacific Time (UTC-7). AWS Security Solutions Architect Jonathan Desrocher will outline how to use AWS services like Elastic Load Balancing (ELB), Auto Scaling, Amazon CloudFront, […]
New Whitepaper: CJIS Compliance on AWS
AWS is an attractive environment for regulated data, including Criminal Justice Information (CJI) subject to the Criminal Justice Information Services (CJIS) Security Policy. AWS customers have used the AWS cloud for a wide range of sensitive federal and state government workloads, including CJI data. Law enforcement customers and partners who manage CJI are taking advantage […]
How to Implement a General Solution for Federated API/CLI Access Using SAML 2.0
Important note from July 18, 2019: The original version of this blog uses Python2.x scripts. We now have Python3.x scripts that you can download here: Form-based authentication version of the Python3.x script AD FS 3.0-specific version of the Python3.x script Note from May 24, 2019: The features and services described in this post have changed since […]
2015 AWS PCI Compliance Package Now Available
We’re happy to announce the availability (upon request) of the 2015 AWS PCI Compliance Package, an assessment completed against the newly released PCI Data Security Standard (PCI DSS) Version 3.1. The PCI DSS is a globally accepted security standard that customers use to support a wide range of sensitive workloads, including the processing and storage […]
Updated HIPAA Whitepaper Now Available
To provide guidance about how to leverage Amazon Web Services (AWS) to develop applications that meet HIPAA and HITECH compliance requirements, we recently updated the Architecting for HIPAA Security and Compliance on Amazon Web Services whitepaper. The advancements and growth of healthcare technology have been an accelerating force behind the continued adoption of cloud computing, […]
How to Address the PCI DSS Requirements for Data Encryption in Transit Using Amazon VPC
The PCI requirements for encryption for data in transit are different for private networks than they are for public networks. When correctly designed, Amazon Virtual Private Cloud (Amazon VPC), a logically isolated portion of the AWS infrastructure that allows you to extend your existing data center network to the cloud, can be considered a private network, […]
Register for and Attend This July 29 Webinar–Troubleshoot Operational & Security Incidents with CloudTrail
Update: The on-demand recording and slides from this webinar are now available. As part of the AWS Webinar Series, AWS will present Troubleshoot Operational & Security Incidents with CloudTrail on Wednesday, July 29. This webinar will start at 12:00 P.M. (noon) and end at 1:00 P.M. Pacific Time (UTC-7). AWS Senior Product Manager Sivakanth Mundru will help you understand the […]
Amazon Glacier Introduces Vault Lock
Amazon Glacier, which enables long-term storage of mission-critical data, has added Vault Lock. This new feature allows you to lock your vault with a variety of compliance controls that are designed to support such long-term records retention. You can now create a Vault Lock policy on a vault, and after it is locked, the policy […]