AWS Storage Blog
Tag: AWS Identity and Access Management (IAM)
Protecting your high-performance file systems with Amazon FSx for Lustre
As companies shift high-performance workloads toward cloud solutions, data storage and data protection go side-by-side. Many companies have both internal and external security rules and regulations they must adhere to when storing their data. Amazon FSx for Lustre offers fully managed, scalable file systems for fast-processing workloads, providing secure, shared access to your users. In […]
Read MoreBuilding a disaster recovery site on AWS for workloads on Google Cloud (Part 2)
One of the design principles to build reliable workloads is to test your recovery procedures. While this is a challenging task in traditional environments (i.e., on-premises), it’s much easier on the cloud because you can predict how your application fails and simulate a failure. You can then validate how your people, technology, and processes work […]
Read MoreBuilding a disaster recovery site on AWS for workloads on Google Cloud (Part 1)
Having a disaster recovery (DR) strategy is an essential part of business continuity and is an important part of designing your workload for resilience. Resilience means that your application, and its supporting infrastructure, always performs its intended functions correctly and consistently over time. In some cases, customers who host their primary workloads on the cloud […]
Read MoreSecurely installing AWS Replication Agent using AWS Security Token Service
The content of this blog post was removed for technical updates to deliver the most up-to-date guidance. We are working to get the entire post re-published with a summary of changes.
Read MoreDisaster recovery monitoring of AWS Elastic Disaster Recovery
Monitoring and troubleshooting disaster recovery (DR) solutions is a critical component of any DR strategy. The ability to receive alerts and status updates is imperative when it comes to limiting downtime and maintaining operations. Often, monitoring a DR solution is a post-deployment afterthought. Administrators must be logged in to the tool to see if it’s […]
Read MoreCopying objects greater than 5 GB with Amazon S3 Batch Operations
The content of this blog post was removed for technical updates to deliver the most up-to-date guidance. We are working to get the entire post re-published with a summary of changes.
Read MoreEnhance data access control with AWS Transfer Family and Amazon S3 Access Points
Sharing data is at the core of collaboration efforts sparking innovation. Many industries rely on secure data access solutions that scale with their business. From pharmaceutical companies exchanging research data with partners in Amazon S3, to financial customers migrating and modernizing transaction data with traditional file transfer protocols, there is a persistent ask for fine-grained […]
Read MoreRecovering AWS GovCloud (US) workloads using CloudEndure Disaster Recovery
AWS GovCloud (US) hosts sensitive data and regulated workloads. It also addresses the most stringent U.S government security and compliance requirements. For customers using AWS GovCloud (US), the ability to recover workloads is a top priority in order to keep business running as usual and adhere to relevant compliance requirements. Getting quickly back up and […]
Read MoreManaging access to backups using service control policies with AWS Backup
Effective and reliable ways of securing data are important to any organization, and every business must address the protection of valuable information. When thinking about security in the cloud, an important consideration is reducing the surface area of negative impacts using a strategic data protection plan. Your data protection plan should mitigate the risk of […]
Read MoreAdding and removing object tags with Amazon S3 Batch Operations
For many organizations, securely and cost-effectively organizing massive amounts of stored data can be a daunting task. Without an easy way to organize data, companies may find themselves exerting a lot of time and energy trying to meet their data storage requirements, potentially slowing down projects and operations. For instance, certain data may need to […]
Read More