AWS Storage Blog

Category: Security, Identity, & Compliance

Amazon S3 LIfecycle

Transition data to cheaper storage based on custom filtering criteria with Amazon S3 Lifecycle

As your organization’s data grows, effective management of storage costs is crucial for operating an efficient and cost-effective data infrastructure. One of the most efficient strategies to reduce storage costs is transitioning files to less expensive cold storage classes. To optimize storage costs according to their specific needs and requirements, organizations need the flexibility to […]

Amazon FSx for NetApp ONTAP

Restrict access to your Amazon FSx for NetApp ONTAP volumes using export policies

Users who support multi-tenant environments need shared storage platforms that can securely isolate data between clients. For example, imagine a pharmaceutical company with several divisions, each working on different product lines. Storage administrators need to prevent one division from viewing or accessing the files and data from the projects of the others. They use export […]

Amazon S3 featured image 2023

Automatically scan for public Amazon S3 buckets and block public access

Data is a valuable asset for an organization and users are always looking for simple tools to protect their data from unauthorized access. While some use cases do require data to be publicly accessible at times, most enterprise use cases and data privacy depend on strictly managed permissions and no public access. Enterprises use Amazon […]

AWS Transfer Family Featured Image

Simplify Active Directory authentication with a custom identity provider for AWS Transfer Family

The secure exchange of files business-to-business is a common and important business practice in highly regulated industries. As organizations grow, maintaining separate user credentials for various platforms, such as file transfer services, can become increasingly complex and time-consuming. As customers build out Managed File Transfer (MFT) environments, often they end up having to create separate, […]

AWS Backup 2021 blog image

Building cyber resiliency with AWS Backup logically air-gapped vault

Enterprise users use AWS Backup for centralized data protection as part of a defense-in-depth architecture. Its features generally fulfill users’ data security and regulatory requirements, but there is demand for additional resiliency against ransomware incidents. Meeting the recovery objectives often involves creating multiple copies of data backups, developing and maintaining custom code for backup processes, […]

Amazon FSx for NetApp ONTAP

Automating Amazon FSx for NetApp ONTAP password rotation with AWS Lambda

Data security is a top priority for customers using AWS cloud services. Based on customer input, AWS has “designed-in” methods enabling customers to automate common security workflows such as password rotation. The principals of this automation follows the AWS Well-Architected Framework which helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for a variety […]

Amazon S3 featured image 2023

Back up your Microsoft 365 estate with Veeam and Amazon S3

Users of productivity software and collaboration services such as Microsoft 365 want to protect their data and often tell us that data durability is one of their highest priorities. With the recent increases in reported cyber incidents, increasing data resilience against threats such as ransomware and other events that may compromise data durability is key. […]

AWS DataSync Featured Image 2020

How London Stock Exchange Group migrated 30 PB of market data using AWS DataSync

London Stock Exchange Group (LSEG) has 30 PB of Tick History-PCAP data, which is ultra-high-quality global market data that is based on raw exchange data, timestamped to the nanosecond. An additional 60 TB is generated every day. LSEG sought to migrate their data from Wasabi cloud storage, LSEG was looking for a new solution to […]

Amazon S3 featured image 2023

Temporarily block data transfers between AWS Regions in Amazon S3

Certain organizations may experience unexpected or outlier cross-region data transfer charges and require time to identify which of their systems or workloads are initiating them. In such cases, it may be useful to temporarily block data transfers to within a particular region. This temporary restriction can prevent further unwanted charges and allows time for audit […]

AWS DataSync

Transfer customer managed SSE-KMS encrypted objects across AWS accounts and Regions using AWS DataSync

Update (7/12/2024): Post updated to clarify that you must use a fully qualified Amazon Resource Name (ARN) when specifying your customer managed KMS keys. Some organizations have requirements to manage their own data encryption keys, both in general and during data transfer processes. In addition, when considering data transfer solutions (not just for encrypted data), […]