AWS Cloud Operations Blog
Category: Security, Identity, & Compliance
Deploying Custom AWS Config Rules in an AWS Organization Environment
In this post, we will show how you can deploy AWS Config custom rules across accounts in your organization, leveraging the Rules Development Kit (RDK), an open source development kit designed to support intuitive and efficient “Compliance-as-Code” workflows. With AWS Config custom rules, you can define custom logic for the desired configuration state of your […]
Announcing evidence finder for AWS Audit Manager
Today, we’re excited to announce a new search feature that allows customers to perform targeted searches by multiple criteria, group the results and send the data to an assessment report. Customers can more easily find the evidence they need and, organize it without the need to add it to a report. Customers can then generate their […]
Automate the sending of AWS Audit Manager assessment reports
Implementing compliance at scale is not an easy endeavor for customers as they move their workloads to the AWS cloud. Due to the challenges that are posed by cloud environments such as the more ephemeral nature of resources or the dynamic landscape of the cloud, automation is paramount to success. At an enterprise scale the […]
Automate continuous compliance at scale in AWS
AWS Config continuously monitors and records your AWS resource configurations. You can use the service to automate the evaluation and remediation of recorded configurations against desired configurations. You also can review changes in configurations and relationships between AWS resources and dive into the history of a resource configuration. AWS Config conformance packs provide a general-purpose compliance […]
How Arctic Wolf uses AWS CloudTrail Lake to Simplify Security and Operations
In this post, we’ll discuss how Arctic Wolf is using AWS CloudTrail Lake to simplify compliance, enhance security operations, and obtain new operational insights from their CloudTrail data. Arctic Wolf, the leader in security operations, helps customers protect their organizations from rapidly evolving cyber threats with the Arctic Wolf Security Operations Cloud and Concierge Security® model. As […]
Prepare for Oracle license audits in AWS using AWS Audit Manager and AWS License Manager
Many of our customers who run Oracle databases need help with managing their Oracle licenses on AWS and ensuring that they have not fallen out of compliance with Oracle’s licensing rules. They must be prepared to provide relevant evidence in an auditor-friendly format during an Oracle license audit. Gathering evidence in a timely manner to […]
Use AWS RAM and AWS MGN to Govern your Migration at scale in AWS
Introduction AWS customers consider Lift & Shift as the first increment of value delivery in their cloud adoption journey. Following this strategy customers will have benefits of speed, cost reduction, business agility, operational resiliency, and staff productivity. As part of the migration plan they will adopt a multi-account strategy to establish their AWS foundation at […]
Fine-grained access control in Amazon Managed Grafana using Grafana Teams
Every customer who uses Amazon Managed Grafana as part of their observability or data visualization service has multiple business units or divisions to serve. Users from these business units or divisions must access Amazon Managed Grafana and manage or view their own resources, such as data sources, dashboards, and alerts. Additionally, IT administrators must manage […]
Managing AWS account lifecycle in AWS Control Tower using the Account Close API
AWS Control Tower provides the easiest way for you to set up and govern your AWS environment following prescriptive AWS best practices managed on your behalf. AWS Control Tower orchestrates multiple AWS services (AWS Organizations, AWS CloudFormation StackSets, Amazon Simple Storage Service (Amazon S3), AWS Single Sign-On, AWS Config, AWS CloudTrail) to build a landing […]
Secure cloud assets using AWS Service Catalog’s Attribute Based Access Control
This post describes how Expedia Group protects production database assets from accidental or automated deletion using the new Attribute Based Access Control (ABAC) feature for AWS Service Catalog. We also cover the benefits of scaling using an ABAC strategy and how Expedia incorporated ABAC to their Cerebro platform. Prerequisites AWS Service Catalog AWS Identity and […]