AWS Storage Blog

Tag: AWS CloudTrail

Protect your resources from unintended deletions through Rule Lock for Recycle Bin

Security and data protection are top-of-mind for AWS customers, especially when dealing with business-critical cloud resources. Customers want to protect their production data from accidental data loss as well as from emerging threats like ransomware, malicious insiders or account takeover attacks. On November 23rd, 2022, we added stronger controls to Recycle Bin through the Rule […]

Amazon EBS at re:Invent 2022: Protect data at rest, in transit, and in volume backups

Mission critical workloads need advanced data services for data protection. Amazon Elastic Block Store (EBS) not only provides high-performance block-level storage volumes for Amazon Elastic Compute Cloud (EC2) instances, but also offers comprehensive and consistent data protection capabilities designed to protect data on block storage. Customers have been using Amazon EBS for over a decade […]

AWS Transfer Family Featured Image

Customize file delivery notifications using AWS Transfer Family managed workflows

Enterprises and organizations that transfer files, both internally and with external parties, can benefit from having file-processing protocols that facilitate efficient and transparent file-transfer management. When transferring files, especially at scale, it is important to have visibility into the status of file transfer, and for you to able to process files as you receive them. […]

Amazon S3 Glacier Storage Classes

Restore data from Amazon S3 Glacier storage classes starting with partial object keys

When managing data storage, it is important to optimize for cost by storing data in the most cost-effective manner based on how often data is used or accessed. For many enterprises, this means using some form of cold storage or archiving for data that is less frequently accessed or used while keeping more frequently used […]

S3 Security

Reduce encryption costs by using Amazon S3 Bucket Keys on existing objects

As more organizations look to operate faster and at scale, they need ways to meet critical compliance requirements and improve data security. Encryption is a critical component of a defense in depth strategy, and when used correctly, can provide an additional layer of protection above basic access control. However, workloads that access millions or billions […]