AWS Startups Blog
Tag: security
Day One Recommendations to Secure Your Account and Workload with AWS Startup Security Baseline
Security is always the top priority for AWS, but let’s face it – it’s not always the top priority for a founder just trying to get your idea for a new company off the ground. That’s why we’re pleased to announce the launch of the AWS Startup Security Baseline (AWS SSB), a new guide that describes the set of controls we recommend all startups implement as a foundation during their initial stages of development and operation.
A Startup’s Guide to AWS Services Series 1: Making Security the Cornerstone
The security of our customers is the top priority for AWS, and especially true for startups in their initial stages of operation. As an AWS customer, you get the most flexible and secure cloud computing environment available today and benefit from the AWS data centers and network that are architected to protect your information, identities, applications, and devices.
Ten Mistakes Founders Make on AWS, and How to Avoid Them
We want to help you stay focused on your customers and building features for your products, so we’ve put together a list of the most common mistakes we see founders make on AWS, paired with advice on how to avoid them to save you time and money.
Why Early Stage Startups Need to Use Multi-factor Authentication
No matter the nature of your startup, security is always of primary importance and should be one of the very first things you address. For most startups, your most valuable asset is your data — your ideas, workloads, and applications — and you need to protect it. Learn why multi-factor authentication is a must-have.
What Does It Mean to Be an AWS Admin at a Startup?
Startup management often grapple with defining and outlining an AWS Admin’s responsibilities. With these resources, founders and stakeholders can hire and develop the best, while maintaining an appropriate level of separation of duties that often plague a startup’s growth and scalability. By following the practices defined here, AWS Admins can balance performing day-to-day activities effectively, help their startups adopt good security hygiene practices often required as part of third-party assurance, and optimize infrastructure costs.
Serverless Tenant Isolation in SaaS Applications with SigTech
Providing innovative technology solutions for some of the world’s leading investors, security is at the heart of everything SigTech does. SigTech offers future-proof quant technologies to global investors. Cloud-hosted and Python-based, the platform integrates a next-gen backtest engine and analytics with curated datasets covering equities, rates, FX, commodities and volatility. Through the use of the deep and rich features provided by AWS services, SigTech has been able to build quant technologies that are operable by their engineering team, can be developed and iterated in an agile way, and meet the security requirements of their customers.
Delivering a Biometric Identity Service with AWS
Nomidio is on a mission to rid the world of passwords. The Nomidio service provides a full lifecycle for biometric identity from registration of individuals to integrated use in contact centers and in corporate single sign-on and user login. Here’s how they built it.
STACS: Implementing a Scalable Access Management Solution using Amazon Cognito and API Gateway
Hashstacs Pte Ltd (“STACS”) is a blockchain development company and technological solutions provider for the financial world. STACS enables financial institutions to realize new revenue generating and operational efficiency use cases. Their team walks through how they leveraged Amazon Cognito and Amazon API Gateway to build a fine-grained access management solution.
Darktrace’s AI-based Cyber Security System Enables Companies to Spot and Stop Cyber Threats
Founded in 2013 by mathematicians from the University of Cambridge, Darktrace has developed an AI-based system for cyber security designed for the modern age. In this article, Mike Beck, Global Head of Threat Analysis at Darktrace, explains how their approach is similar to the human immune system.
Remote Work Rises: A Checklist for Secure Networks on AWS
An organization that rushes to make remote work possible may experience network strain and expose themselves to data breaches if the transition lacks a rock-solid security foundation. Organizations that make AWS a cornerstone of their cloud grapple with this notion too, but this checklist allows them to prepare and complement their AWS solution with a security model that provides speedy, safe access to any number of remote employees no matter where they choose to work.