AWS Security Blog
Tag: Security Blog
Amazon RDS Customers: Update Your SSL Certificates by March 23, 2015
If you are an Amazon RDS customer, you might have received email from AWS notifying you about rotating your SSL certificates. The SSL certificates for RDS database instances are being updated on March 23, 2015, at 20:00 UTC. The certificates are being updated as part of standard maintenance and security best practices for RDS, and […]
Coming March 25, 2015: Upgrades to IAM Policy Validation
On March 25, 2015, we will upgrade the Identity and Access Management (IAM) policy validation to help ensure that your policies reflect your intentions. Starting on this day, to save changes to policies, you must first ensure that your policies comply with the IAM policy grammar. Your existing policies will continue to work as they […]
Enable Autoformatting for Your Policies in the Identity and Access Management Console
Have you ever thought that authoring Identity and Access Management (IAM) policies would be easier if the JSON of your policies were automatically formatted? If so, you will be excited to hear you can now enable autoformatting for all your policies by simply selecting a single check box. In this blog post, I will show […]
Quickly Diagnose Policy Errors by Using the AWS Identity and Access Management Console
Have you ever spent time searching for a syntax error—such as a missing comma—when editing an AWS Identity and Access Management (IAM) policy? If so, you will be happy to hear that AWS has made it easier for you to identify and correct such errors. To help you find the source of the errors, we’ve […]
Understanding the AWS Security Model: Register For and Attend the Webinar
Note: The video and slides of this webinar are now available. As part of the new AWS Webinar Series, AWS will present Understanding the AWS Security Model on Thursday, March 19. This webinar will start at 9:00 A.M. and end at 10:00 A.M. Pacific Time (UTC-7). Senior Manager Max Ramsay will examine how to use […]
AWS Architecture and Security Recommendations for FedRAMP Compliance
Some of the most common compliance-related requests we receive from our customers are for reference architecture, a template for how to build your infrastructure in the cloud. These requests indicate how some people learn new concepts: reference architecture visualizations can help to clarify subject matter. In order to clarify how you can use AWS functionality […]
Test Your Managed Policies by Using the Identity and Access Management Policy Simulator
Recently, AWS launched managed policies, which simplify policy management by enabling you to attach a single policy to multiple AWS Identity and Access Management (IAM) entities such as users, groups, and roles. When you update a managed policy, the permissions in that policy apply to every entity to which the managed policy is attached. We […]
Share Custom Encryption Keys More Securely Between Accounts by Using AWS Key Management Service
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create, control, rotate, and use your encryption keys in your applications. KMS allows you to create custom keys that other AWS Identity and Access Management (IAM) users and roles in your AWS account can use. You can also enable […]
AWS Security Token Service Is Now Available in Every AWS Region
AWS Security Token Service (STS), which enables your applications to request temporary security credentials, is now available in every AWS region. Previously, STS had only a single endpoint (https://sts.amazonaws.com), but now, there is an endpoint in every AWS region. By bringing STS to a region geographically closer to you, your applications and services can call […]
An Easier Way to Manage Your Policies
AWS recently announced a new feature of AWS Identity and Access Management (IAM): managed policies. Managed policies enable you to attach a single policy to multiple IAM users, groups, and roles (in this blog post referred to collectively as “IAM entities”). When you update a managed policy, the permissions in that policy apply to every […]