AWS Security Blog

New SOC 1, 2, and 3 Reports Available — Including a New Region and Service In-Scope

We are now in our sixth year of regularly publishing comprehensive independent audit reports attesting to our alignment with globally accepted security best practices. We have just completed our thorough and extensive semiannual audit and are happy to announce that Amazon Simple Queue Service (SQS) and our newest region in Europe (Frankfurt) are now in-scope […]

Register for and Attend This May 22 Webinar: Getting Started with AWS Identity and Access Management

As part of the AWS Webinar Series, AWS will present Getting Started with AWS Identity and Access Management on Friday, May 22. This webinar will start at 10:30 A.M. and end at 11:30 A.M. Pacific Time (UTC-7). AWS Security Solutions Architect Jonathan Desrocher will introduce the fundamental concepts of AWS Identity and Access Management (IAM) […]

How to Receive Alerts When Specific APIs Are Called by Using AWS CloudTrail, Amazon SNS, and AWS Lambda

Let’s face it—not all APIs were created equal. For example, you may be really interested in knowing when any of your Amazon EC2 instances are terminated (ec2:TerminateInstance), but less interested when an object is put in an Amazon S3 bucket (s3:PutObject). In this example, you can delete an object, but you can’t bring back that […]

AWS Directory Service Now Supports API Access and Logging Via AWS CloudTrail

Developers can now programmatically create and configure Simple AD and AD Connector directories in AWS Directory Service via the AWS SDKs or CLI. You can also now use Cloud Trail to log API actions performed via an SDK, the CLI, or AWS Directory Service console. Permissions for performing these actions can be controlled via an AWS […]

Staying Ahead of the Curve–Customer Enabler AWS OCIE Cybersecurity Initiative Workbook

We focus on enabling our customers to scale their security and compliance capabilities on AWS, and we enhance our customers’ ability to meet a wide variety of security and regulatory requirements. With a continued focus on our customers’ regulatory needs in the financial services sector, we created another customer facing workbook, which aligns the new […]

AWS re:Invent 2015 Registration Is Now Open

Registration is now open for the fourth annual AWS re:Invent conference—the largest gathering of the global cloud computing community. Join us for more than 250 technical sessions, hands-on bootcamps, certification exams, self-paced labs, hackathons, and exciting after-hours events. Date: October 6–9, 2015 Location: The Venetian, Las Vegas Full conference pass: $1,299 Register now: https://reinvent.awsevents.com/ Top […]

Amazon Redshift and Amazon RDS Now Support Encryption via AWS Key Management Service in the AWS GovCloud (US) Region

Today, Amazon Redshift and Amazon RDS for MySQL, PostgreSQL, Oracle, and SQL Server DB released support for encryption using AWS Key Management Service (KMS) in the AWS GovCloud (US) region. Using keys under your control, you can now encrypt RDS instances, including MySQL, PostgreSQL, Oracle, and SQL Server DB instance types, and Amazon Redshift clusters in AWS GovCloud […]

AWS Key Management Service Now Available in the AWS GovCloud (US) Region

AWS Key Management Service (KMS) is now available in the AWS GovCloud (US) region. You can now encrypt data in your own applications and within the following AWS services in GovCloud by using keys under your control: Amazon Elastic Block Store volumes Amazon S3 objects using Server Side Encryption (SSE-KMS) and client-side encryption using the […]

How to Switch Easily Between AWS Accounts by Using the AWS Management Console and AWS Directory Service

Earlier this year, the AWS Identity and Access Management (IAM) team announced support for the Switch Role feature, which allows your users to switch between accounts in the AWS Management Console. The benefit to your users is that they can switch accounts without being required to sign out and sign in for each account. In […]

2015 AWS Summit Security Presentations Are Now Available

As a basic tenet, you never want to compromise on security. How, though, do you maintain the highest standards of security while not losing the ability to iterate quickly? At AWS, we address this challenge daily. In our recent AWS Summits in San Francisco and London, we shared some of our best practices so that […]