AWS Security Blog
Tag: Security Blog
How to Establish Federated Access to Your AWS Resources by Using Active Directory User Attributes
To govern federated access to your AWS resources, it’s a common practice to use Microsoft Active Directory (AD) groups. When using AD groups, establishing federation requires the number of AD groups to be equal to the number of your AWS accounts multiplied by the number of roles in each of your AWS accounts. As you […]
AWS Encryption SDK: How to Decide if Data Key Caching Is Right for Your Application
Today, the AWS Crypto Tools team introduced a new feature in the AWS Encryption SDK: data key caching. Data key caching lets you reuse the data keys that protect your data, instead of generating a new data key for each encryption operation. Data key caching can reduce latency, improve throughput, reduce cost, and help you […]
The First AWS Regional Financial Services Guide Focuses on Singapore
To help Financial Services clients address Singapore’s regulations on financial institutions in a shared responsibility environment, AWS has published the AWS User Guide to Financial Services Regulations and Guidelines in Singapore. This first-ever AWS Financial Services guide is the culmination of the work AWS has done in the last year to help customers navigate the Monetary […]
Announcing the New AWS Customer Compliance Center
AWS has the longest running, most effective, and most customer-obsessed compliance program in the cloud market. We have always centered our program around customers, obtaining the certifications needed to provide our customers with the proper level of validated transparency in order to enable them to certify their own AWS workloads [download .pdf of AWS certifications]. […]
Newly Updated: Example AWS IAM Policies for You to Use and Customize
To help you grant access to specific resources and conditions, the Example Policies page in the AWS Identity and Access Management (IAM) documentation now includes more than thirty policies for you to use or customize to meet your permissions requirements. The AWS Support team developed these policies from their experiences working with AWS customers over the years. […]
How to Monitor and Visualize Failed SSH Access Attempts to Amazon EC2 Linux Instances
As part of the AWS Shared Responsibility Model, you are responsible for monitoring and managing your resources at the operating system and application level. When you monitor your application servers, for example, you can measure, visualize, react to, and improve the security of those servers. You probably already do this on premises or in other […]
How to Use AWS Organizations to Automate End-to-End Account Creation
AWS Organizations offers new capabilities for managing AWS accounts, including automated account creation via the Organizations API. For example, you can bring new development teams onboard by using the Organizations API to create an account, AWS CloudFormation templates to configure the account (such as for AWS Identity and Access Management [IAM] and networking), and service control […]
How to Use Batch References in Amazon Cloud Directory to Refer to New Objects in a Batch Request
In Amazon Cloud Directory, it’s often necessary to add new objects or add relationships between new objects and existing objects to reflect changes in a real-world hierarchy. With Cloud Directory, you can make these changes efficiently by using batch references within batch operations. Let’s say I want to take an existing child object in a […]
Write and Read Multiple Objects in Amazon Cloud Directory by Using Batch Operations
Amazon Cloud Directory is a hierarchical data store that enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions. For example, you can create an organizational structure that you can navigate through multiple hierarchies for reporting structure, location, and cost center. In this blog post, I demonstrate how you can […]
Coming Soon: Improvements to How You Sign In to Your AWS Account
Update from August 25, 2017: These improvements are now live. For more details, see Now Available: Improvements to How You Sign In to Your AWS Account. Coming soon, AWS will improve the way you sign in to your AWS account. Whether you sign in as your account’s root user or an AWS Identity and Access Management (IAM) […]