AWS Storage Blog
Category: Amazon Simple Notification Service (SNS)
Modern data protection architecture on Amazon S3: Part 1
Update (12/11/2023): As of November 20, 2023, Amazon S3 supports enabling S3 Object Lock on existing buckets. Keeping data secure and usable in unforeseen circumstances like accidental breaches, human error, and hacking is critical to business continuity and success. To effectively mitigate the impact of these events on business-critical assets, one of the recommended strategies […]
Monitoring the health of Amazon FSx file systems using Amazon EventBridge and AWS Lambda
Storage administrators who are using managed services need a way to monitor the health of their resources, in order to detect any changes in resource health or accessibility that might require their attention or intervention. For administrators managing large fleets of resources, this monitoring needs to be efficient and scalable so that any alerts are […]
Automating disaster recovery of Amazon RDS and Amazon EC2 instances
Complex environments can sometimes feel like they require complex disaster recovery (DR) solutions, which usually consist of multiple DR offerings from different vendors that may not interact with each other. There are many ways to build a DR solution in the cloud. Luckily, with AWS, you can easily configure multiple DR services and orchestrate them […]
AWS Backup anomaly detection for Amazon EBS volumes
Protecting your data from cyberattacks and ransomware is a critical responsibility, and taking the necessary steps to detect anomalous activity at every level within your organization can help you keep your data as safe as possible. Data storage is an important area where you can and should deploy anomaly detection. To protect your storage, in […]
How to implement a centralized immutable backup solution with AWS Backup
Many organizations around the world, such as government agencies, financial institutions, and nonprofits, are required to maintain and securely store their data long term to comply with regulatory and business requirements. One way to fulfill such requirements is via a centralized immutable backup solution that creates and stores secure and immutable backups of their data […]
Collecting, archiving, and retrieving surveillance footage with AWS
Video feeds and still images from judiciary locations are considered critical forms of evidence in the court of law. These locations can be police stations and government offices or even civil locations of importance like banks and hospitals. As governments, particularly in smart cities rely upon video surveillance, it is critical to design a cost […]
Configuring notifications to monitor AWS Backup jobs
Your data and applications are some of the most valuable assets in your company. The ability to protect your data and IT infrastructure against cyber-attacks, accidental deletion, natural disasters, and several other threats is essential to secure your business. An important aspect to protecting your assets is the ability to monitor backup, restore, and copy […]
Implementing sensor workflows using AWS Snowcone and AWS IoT Greengrass
In our first blog of this series, we covered using an IoT device to store the sensor data on an Amazon EC2 instance running on AWS Snowcone. That use case covered collecting data from sensors in locations such as a factory floor or a mine with austere network connectivity. There are other instances where you […]
Building a central asset register with Amazon S3 Inventory
UPDATE 7/12/2022: Amazon SQS policy updated to support every AWS Region (step 3 in the architecture diagram) in the central.yml template. Many AWS customers store millions of objects in their Amazon S3 buckets, due to the scalability, durability, and performance that S3 provides. Customers compelled to build an information asset register for compliance reasons or […]
Building an IoT solution at the edge with AWS Snowcone
UPDATE: The second blog post in this two-post series was published on January 5, 2020. Internet of Things (IoT) applications, like other applications, require edge solutions to operate in austere conditions with limited network connectivity or limited infrastructure. IoT applications at the edge can span numerous uses, like automation, optimization, and intelligent manufacturing to name […]