AWS Storage Blog

Category: Security, Identity, & Compliance

AWS Elastic Disaster Recovery

Securely installing AWS Replication Agent using AWS Security Token Service

The content of this blog post was removed for technical updates to deliver the most up-to-date guidance. We are working to get the entire post re-published with a summary of changes.

Read More
AWS Backup 2021 blog image

Protecting encrypted Amazon RDS instances with cross-account and cross-Region backups

Organizations are looking for solutions to protect their valuable data against ransomware attacks, natural disasters, and operational errors. Many of these organizations operate in regulated industries and must maintain data long-term to meet compliance obligations and business continuity goals. In AWS, customers can accomplish these goals by backing up mission-critical databases into centralized backup storage […]

Read More
S3 Security

Reduce encryption costs by using Amazon S3 Bucket Keys on existing objects

As more organizations look to operate faster and at scale, they need ways to meet critical compliance requirements and improve data security. Encryption is a critical component of a defense in depth strategy, and when used correctly, can provide an additional layer of protection above basic access control. However, workloads that access millions or billions […]

Read More
Amazon S3

Allowing external users to securely and directly upload files to Amazon S3

Organizations are often required to store files, images, and other digital assets in a repository. In many cases, the source of these files are partners or individuals who are not connected to internal systems and requires corporate authentication in order to upload the files. Customers traditionally use servers to handle file uploads, which can use […]

Read More
AWS Backup 2021 blog image

Automate visibility of backup findings using AWS Backup and AWS Security Hub

Centralizing and automating data protection helps you support your business continuity and regulatory compliance goals. Backup compliance includes the ability to define and enforce backup policies to encrypt your backups, protect them from manual deletion, prevent changes to your backup lifecycle settings, and audit and report on backup activity from a centralized console. A common […]

Read More
AWS Transfer Family Featured Image

Enabling user self-service key management with AWS Transfer Family and AWS Lambda

Customers who use the AWS Transfer Family service are typically exchanging files with their business partners who provide them with SSH public keys. In a large-scale deployment of the AWS Transfer Family service, public key management eventually becomes a time-consuming task to refresh expired keys and rotate keys for security. When using custom identity providers (custom IdP), […]

Read More
Amazon S3 Object Lambda

Managing access to your Amazon S3 objects with a custom authorizer

Data protection is critical for most customers seeking to safeguard information, maintain compliance, secure applications, and more. Protecting data can become challenging when different entities or personas need different levels of access to data. In Amazon S3, access control can be managed with tools like AWS Identity and Access Management (IAM) policies, bucket policies, access […]

Read More
AWS Backup 2021 blog image

Simplify auditing your data protection policies with AWS Backup Audit Manager

Have you had to prove to an auditor that you are protecting and retaining data adequately to meet regulatory or organizational requirements?  The audit process can be resource intense. To meet an auditor’s criteria, the burden of proof is on you to show that you had proper controls in place to protect and retain your […]

Read More
AWS Backup 2021 blog image

Obtain aggregated daily cross-account multi-Region AWS Backup reporting

UPDATE (2/3/2022): Source code extended to support AWS Backup for Amazon S3. UPDATE (6/24/2022): Source code updated to support tag extraction to support cost allocation reporting. Customers treat data as an asset and look to protect their data assets through data protection mechanisms. Customers value the seamless ability to report and act on data protection […]

Read More