AWS Partner Network (APN) Blog
Category: Security, Identity, & Compliance
Uncover Malicious Activity and Protect Amazon EKS Workloads from Network-Based Threats Using Calico Cloud
With Amazon EKS, developers can easily deploy, scale, and manage containerized applications across a cluster of machines. As EKS environments grow and support critical business operations, securing these environments becomes increasingly important. Learn how Tigera’s Calico Cloud provides an active security platform with full-stack observability for containers and Kubernetes, and how to uncover malicious activity and protect your workloads in EKS using Calico Cloud.
Simple and Flexible SaaS Entitlement Management with LaunchDarkly
Being able to support varying tenant configurations is a common requirement for SaaS providers. Learn how LaunchDarkly creates varied tenant experiences with entitlement flags and how to model entitlements as feature flags, targeted to tiers to give tenants access to specific features. We’ll also dive into ways you can use the LaunchDarkly feature for flagging deployments/releases, doing progressive rollouts, or running experimentation—all important release practices for SaaS providers.
Streamlined Resource Management with the Infosys Automated Self-Service Landing Zone Solution for AWS
Infosys has crafted an automated self-service landing zone solution for AWS which employs AWS Control Tower to generate the customer’s organization unit structure and set up individual accounts. It uses the infrastructure as code tools from Terraform for infrastructure provisioning and Ansible for service configuration. The landing zone provides a pre-configured and secure environment, functioning as a springboard for organizations to manage their AWS resources effectively.
Elastio Integrates with AWS Backup for Secure Backups to Enhance Ransomware Defense
Elastio’s integration between its Cyber Recovery as a Service (CRaaS) platform and AWS Backup is run from within the customer’s AWS account, and Elastio does not have access to view or take custody of customer data, nor does it have access to encryption keys. AWS customers control all policy details, including which account(s) to run it in, what assets to scan, and whether to automatically scan or do so on a point-in-time basis.
Achieving Compliance with Healthcare Regulations Using safeINIT’s HIPAA-Compliant Environment
Healthcare organizations must take strict measures to protect patient data, including using secure infrastructure to host applications. It’s important to remember that compliance is not just about avoiding penalties—it’s about keeping patients’ personal health information safe. Learn how a new infrastructure-as-code HIPAA-compliant environment from safeINIT is designed specifically to protect sensitive data for healthcare applications on AWS.
Automate SAML 2.0 Federation for AWS Organizations Using Azure Active Directory
Many enterprises want to streamline identity management by introducing a single identity provider for their multi-cloud approach. In this post, we’ll cover the integration of single sign-on with Azure Active Directory in the context of AWS Control Tower. Learn how Devoteam A Cloud recently led a migration project where it presented a client with two options for integrating SAML 2.0 federation into their AWS Organization using Azure AD.
Risk-Based, Fine-Grained Authorization with Transmit Security and Amazon Verified Permissions
Managing and securing account access can feel like navigating a complex landmine of risk. Learn how to take a risk score calculated by Transmit Security and use it as an input to an authorization decision made by Amazon Verified Permissions, which delivers a pre-built system that simplifies policy-based access control and is flexible enough to address the most advanced authorization requirements for custom applications. With granular policies, it’s highly effective for determining who has access to what.
Controlling Access to Amazon API Gateway with CyberArk Identity and Amazon Verified Permissions
SaaS applications and services secure access to their resources by adding logic to make decisions when handling a user request. These decisions can be based on user roles and attributes, request context, and more. In this post, learn how CyberArk Identity works seamlessly as the identity provider with Amazon Verified Permissions. A managed authorization service, Amazon Verified Permissions provides a scalable, fine-grained permissions management and authorization service for custom apps.
Applying Fine-Grained Authorization to Legacy Apps with Strata Identity Orchestration and Amazon Verified Permissions
Achieving a zero-trust architecture is a top priority for many organizations, and a big part is externalizing authorization to ensure least privilege access for all applications. Amazon Verified Permissions is a fine-grained authorization service for developers building custom applications. Learn how Strata Identity’s Maverics Identity Orchestration platform allows you to simplify cloud migration and modernization projects by augmenting your datasets to ensure comprehensive policy enforcement.
Streamline Your HIPAA Security Program on AWS with Dash ComplyOps
Healthcare organizations and software providers that build and manage healthcare workloads must formulate the appropriate strategies to establish an effective security and compliance program. Walk through best practices for AWS customers to build, monitor, and maintain a robust HIPAA security program across AWS cloud environments, and learn how to automate compliance efforts by leveraging AWS-native services alongside Dash ComplyOps.