AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Security-10

How to Mitigate Security and Privacy Resistance in Secure Data Migrations

One of the first steps for organizations adopting AWS is migrating data from an on-premises environment or existing cloud to AWS. Many legal and regulatory requirements make it imperative to know the cause and reason for collection, storage, and usage of data, as well as the exact physical location of the data. Learn how Dataguise, a PKWARE company, helps organizations minimize risk and cost during the data migration process.

Radware-AWS-Partners

How Radware CNP Uses Amazon Route 53 Query Logging for Threat Detection

AWS recently launched a new feature as part of its Amazon Route 53 service, called Route 53 Resolver Query Logging. This new service enables organizations to retrieve logs of their Domain Name System (DNS) queries originating from resources within their VPCs. Learn how these logs can be analyzed as part of the Radware Cloud Native Protector Service (CNP), which provides a range of fully managed, enterprise-grade cloud security solutions to protect applications running in public clouds.

Sysdig-AWS-Partners

Unifying Threat Detection for Cloud and Containers to Reduce Risk Using Sysdig

Implementing effective threat detection for applications in the cloud requires visibility into all aspects of your infrastructure and workloads. By taking advantage of AWS services, you’re freed to focus on the applications that drive your business. Security in the cloud is a shared responsibility between AWS and the customer, however, and Sysdig’s cloud security platform helps you follow security best practices and simplify the work of securing your AWS account and workloads.

Infosys-AWS-Partners

Driving Business Transformation and Cloud Security with Secure Cloud Foundation by Infosys Compaz

Secure Cloud Foundation is a fully managed platform-as-a-service offering from Infosys Compaz (iCompaz), an Infosys Limited joint venture. It provides a managed platform with foundational secure landing zone capabilities, as well as application and workload hosting capabilities. Secure Cloud Foundation helps customers achieve enterprise-grade security for their workloads running on AWS. In this post, walk through typical customer cloud adoption scenarios that could leverage the Secure Cloud Foundation.

Sonrai-Security-AWS-Partners

Identify and Eliminate Risks on AWS IAM and Secure Data Stores Using Sonrai Dig

With the move to cloud, there has been a paradigm shift in how we protect our most valuable asset—data. Learn the importance of building a complete and accurate risk profile, which consists of your identity and data relationships. You’ll also learn how it’s critical to protect the sensitive, private, and confidential data. Sonrai Dig graphically maps all of your identities and determines their effective permissions, allowing you to get to least privilege across your entire AWS environment.

Cisco-Stealthwatch-Cloud-AWS-Partners

Cloud Posture and Threat Analytics with Cisco Secure Cloud Analytics

As organizations continue to adopt AWS, their risk footprint increases from both an infrastructure and network perspective as it relates to compliance posturing, configuration risk, and network threats. Explore the integration between AWS and Secure Cloud Analytics, a SaaS-delivered Network Detection (NDR) offering from Cisco that monitors multi-cloud and hybrid environments for threats and policy violations and provides comprehensive visibility for any environment.

MongoDB-AWS-Partners

How to Integrate AWS Single Sign-On with MongoDB Atlas

MongoDB Atlas is the global cloud database service for modern applications, and in this post learn how to configure MongoDB Atlas to authenticate using AWS Single Sign-On (AWS SSO). Instead of having to sign in separately to MongoDB Atlas Control Plane, with this configuration enabled users can access the MongoDB Atlas user interface with their corporate credentials using AWS SSO. This delivers a better user experience without the need for managing separate sets of credentials.

Virtusa-AWS-Partners

Exposing Private APIs Across AWS Accounts Only for Authorized Access Methods

Virtusa recently received a requirement to make an application programming interface (API) accessible across another AWS account. The API was an internal-only API hosted in a private subnet, and could be accessed only from within the network. The requirement also stipulated Virtusa make only a few read-only (Get) methods accessible, and not all the methods from the API. Learn how Virtusa addressed the customer’s challenge by designing a solution that uses Amazon API Gateway with IAM authentication.

Cloud Anything-9

Applying Dynamically Generated Isolation Policies in SaaS Environments

As part of adopting a multi-tenant SaaS model, a key challenge is how to provide strong tenant isolation in a cost effective and scalable manner. Being able to effectively isolate your tenants is an important part of a multi-tenant system. Learn how dynamic policy generation gets applied as part of the overall isolation story of your SaaS solution, and follow along with AWS reference implementation to demonstrate how to use dynamically generated policies in code.

Embracing DevSecOps: Building Security into Cloud-Native Development Workflows

Automation and integration are critical to producing applications with fewer flaws at a speed that won’t slow developers down. However, this is only possible with a well-planned DevSecOps program and the right tools embedded into your software development lifecycle. Dig into the importance of the digital shift and how you can implement DevSecOps into existing workflows with the combined control of Veracode’s scanning tools and AWS integrations.