AWS Partner Network (APN) Blog
Tag: Compliance
How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance
Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.
Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax
Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.
A FinTech Roadmap to Data Security and Compliance with VGS and AWS
To meet compliance like PCI-DSS, SOC2, and HIPAA, a customer typically has to change their architecture and workload, which can take significant time, money, and effort. With Very Good Security (VGS), customers retain full control over their data while offloading information security burdens, transferring the risk of a data breach, and fast-tracking compliance. VGS acts as a secure layer between your company and sensitive data.
Automating Best Practices with nOps and the AWS Well-Architected Framework
An AWS Well-Architected Review is the optimal way to measure your architecture against AWS best practices and to improve your architecture by addressing critical issues. Learn how the nOps cloud management platform allows customers and consulting partners to have a more accurate view of AWS service configurations in alignment with the Well-Architected Framework. We’ll also explore how nOps enables more prescriptive and real-time insights to continuously improve the architecture over time.
Enabling Security and Compliance in an AWS-Based Big Data Analytics Platform Using Cattle Server Automation and IaC
This post describes a solution created by IBM during the migration of a big data and analytics platform for one of the top 10 banks worldwide. The primary drivers were cost efficiency, business agility, and performance. The “pet to cattle” concept was applied to this solution to transform the legacy high availability disaster recovery solution to a more robust and cost-effective cattle-based solution through the use of AWS-native services.
Network Transformation with AWS and Valtix for Workload Segmentation and Compliance
As a multi-cloud network security platform, Valtix enables teams to meet the most stringent security requirements in a cloud-first and simple way. Learn about the transformation of network security use case leveraging Valtix for segmentation of workloads and to help meet compliance requirements. We’ll also walk through an example of how to enforce consistent security across tens and hundreds of VPCs spanning multiple regions and AWS accounts.
Security and Compliance at Scale with CloudHealth Secure State
Security is the highest priority for AWS, which works closely with industry-leading partners such as CloudHealth by VMware to build security solutions for customers like CloudHealth Secure State (CHSS). Learn how you can set up CHSS projects, suppress rules and alerts, find misconfigurations through CHSS Explore, and set up remediation jobs all built on CloudHealth’s unified security monitoring approach for AWS.
Announcing the Authority to Operate on AWS Program’s Global Security and Compliance Acceleration Initiative
Recognizing that AWS maintains customers across the world, we have launched the Global Security and Compliance Acceleration (GSCA) initiative under the Authority to Operate (ATO) on AWS Program banner. The purpose of this new initiative is to add a global focus to our existing ATO on AWS support mechanisms, with an emphasis on recruiting qualified international AWS Partners to operate and support customers in differing regions.
Managing Security and Compliance for Your Journey to AWS with Wipro Cloud Application Risk Governance
To manage complexities across the various phases of an enterprise’s cloud journey, Wipro has developed a solution called Cloud Application Risk Governance (CARG). This solution is powered by Wipro’s Common Cloud Controls Framework (C3F) that addresses customers’ needs and concerns along their cloud security journey. It’s a single pane of glass solution that delivers a holistic risk and threat view, and provides an automated compliance adherence view of AWS-based business applications.
Enhancing the AWS Well-Architected Tool to Provide Continuous Compliance with Trend Micro Cloud One – Conformity
Learn how to enrich the AWS Well-Architected Tool’s workload report by adding the results of definitive best practice checks. This post will also associate the workload with specific AWS resources through the use of tags. Once the workload is tagged, you can use Trend Micro’s Cloud One – Conformity, which allows you to create a 360-degree workload review. This provides continuous assurance that your resources are complying with the AWS Well-Architected Framework.