AWS Partner Network (APN) Blog
Tag: Identity and Access Management
Secure Certificate Management with HashiCorp Consul on AWS
The adoption of service mesh has been accelerated by the emergence of microservices. Companies leverage orchestration tools for deploying services, and then use a service mesh to manage the connections between them. These solutions provide important capabilities, such as traffic management and load balancing. Learn how HashiCorp Consul and AWS Certificate Manager Private CA automate certificate management, perform signing operations, and rotate private certificates.
Simplifying Fine-Grained Access to AWS Resources with Ping Identity
With the recent launch of AWS Identity and Access Management (IAM) session tags, customers can simplify fine-grained access to Amazon Web Services (AWS) resources by using attributes from their own corporate directories in permissions rules. Enterprise customers frequently manage their workforce identities (the “who”) using an identity provider (IdP) such as PingFederate or PingOne for Enterprise by Ping Identity.
How to Add Security and Compliance Auto-Remediation with the Cloud Conformity Platform
Automation is becoming more and more critical to organizations needing to manage and govern cloud infrastructure. Cloud Conformity’s auto-remediation tool helps to alleviate security and compliance concerns by using AWS Lambda to fix any non-compliant resources within your AWS account. Cloud Conformity is an assurance and governance tool that continuously monitors one or more AWS services based on AWS Well-Architected best practices.
How to Secure Enterprise Cloud Environments with AWS and HashiCorp
Security isn’t always top of mind for developers because it can slow down software releases. HashiCorp Vault helps eliminate much of the security burden developers experience while trying to comply with security team requirements. Vault was built to address the difficult task of passing sensitive data to users and applications without it being compromised. Within Vault, all transactions are token-based, which limits potential malicious activity, and provides greater visibility into whom and what is accessing that information.
Automating Security, Governance, and Monitoring in AWS Landing Zone to Save Time, Effort, and Cost
Enterprises migrating to AWS with multiple applications and distributed teams often lack centralized governance, management, or security systems. With AWS Landing Zone, you can configure and provision a secure, scalable, automated, multi-account AWS environment aligned with AWS best practices without existing resources. It gives you granular, centralized control over your cloud workloads, with a consistent level of security and compliance across all accounts.
Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage
DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities.
Deploying a Data Lake in Minutes with Cloudwick’s Data Lake Foundation on AWS
To gain the insights needed to fuel business growth, organizations need to collect more data and do more with it. That’s where a data lake can help—it’s a repository that holds a large amount of raw data in its native (structured or unstructured) format until that data is needed, enabling you to accommodate virtually any use case. Check out Cloudwick’s Data Lake Foundation on AWS Quick Start, and then drill down a bit deeper into the workings and value of the data catalog.