AWS Security Blog

AWS re:Invent 2015 Registration Is Now Open

Registration is now open for the fourth annual AWS re:Invent conference—the largest gathering of the global cloud computing community. Join us for more than 250 technical sessions, hands-on bootcamps, certification exams, self-paced labs, hackathons, and exciting after-hours events. Date: October 6–9, 2015 Location: The Venetian, Las Vegas Full conference pass: $1,299 Register now: https://reinvent.awsevents.com/ Top […]

Read More

Amazon Redshift and Amazon RDS Now Support Encryption via AWS Key Management Service in the AWS GovCloud (US) Region

Today, Amazon Redshift and Amazon RDS for MySQL, PostgreSQL, Oracle, and SQL Server DB released support for encryption using AWS Key Management Service (KMS) in the AWS GovCloud (US) region. Using keys under your control, you can now encrypt RDS instances, including MySQL, PostgreSQL, Oracle, and SQL Server DB instance types, and Amazon Redshift clusters in AWS GovCloud […]

Read More

AWS Key Management Service Now Available in the AWS GovCloud (US) Region

AWS Key Management Service (KMS) is now available in the AWS GovCloud (US) region. You can now encrypt data in your own applications and within the following AWS services in GovCloud by using keys under your control: Amazon Elastic Block Store volumes Amazon S3 objects using Server Side Encryption (SSE-KMS) and client-side encryption using the […]

Read More

How to Switch Easily Between AWS Accounts by Using the AWS Management Console and AWS Directory Service

Earlier this year, the AWS Identity and Access Management (IAM) team announced support for the Switch Role feature, which allows your users to switch between accounts in the AWS Management Console. The benefit to your users is that they can switch accounts without being required to sign out and sign in for each account. In […]

Read More

2015 AWS Summit Security Presentations Are Now Available

by Paul Stamp | on | in Events* | Permalink | Comments |  Share

As a basic tenet, you never want to compromise on security. How, though, do you maintain the highest standards of security while not losing the ability to iterate quickly? At AWS, we address this challenge daily. In our recent AWS Summits in San Francisco and London, we shared some of our best practices so that […]

Read More

Using AWS in the Context of CESG UK’s Cloud Security Principles

Last year, CESG UK published the Cloud Security Guidance documents for public sector organizations that are considering the use of cloud services for handling information classified as OFFICIAL. The guidance aims to help public sector organizations make informed decisions about cloud services and choose a cloud service that balances business benefits and security risks. In […]

Read More

New in IAM: Quickly Identify When an Access Key Was Last Used

Rotate access keys regularly and remove inactive users. You’ve probably heard us mention these as two AWS Identity and Access Management (IAM) security best practices. But how do you know when access keys (for an IAM user or the root account) are no longer in use and safe to delete? To help you answer this […]

Read More

Security Best Practices: Compliance Beyond the Check Box–Register For and Attend the Webinar

Update: The slides from this webinar are now available. As part of the AWS Webinar Series, AWS will present Security Best Practices: Compliance Beyond the Check Box on Tuesday, April 28. This webinar will start at 10:30 A.M. and end at 11:30 A.M. Pacific Time (UTC-7). Principal Solutions Architect Bill Shinn will help you understand […]

Read More

DoD-Compliant Implementations in the AWS Cloud

Our US federal customers are finding interesting and exciting ways to use the AWS cloud for their IT infrastructure and data management. Our focus on these customers remains a high priority for AWS Compliance, and to further our efforts in providing customer-focused compliance enablers, we have updated our existing Department of Defense (DoD) whitepaper. This […]

Read More

New Whitepaper—Single Sign-On: Integrating AWS, OpenLDAP, and Shibboleth

The newly released whitepaper, Single Sign-On: Integrating AWS, OpenLDAP, and Shibboleth, will help you integrate your existing LDAP-based user directory with AWS. When you integrate your existing directory with AWS, your users can access AWS by using their existing credentials. This means that your users don’t need to maintain yet another user name and password […]

Read More