AWS Partner Network (APN) Blog
Category: Security, Identity, & Compliance
Delivering Comprehensive Cybersecurity Insights with Tenable One Data Platform on AWS
Tenable One Exposure Management Platform gives organizations a comprehensive view of their attack surface and vulnerabilities to prevent likely attacks and accurately communicate cyber risk. Learn how the Tenable data engineering team uses AWS to ingest data from multiple sources and transform it into a single standard structure. By standardizing into a single data structure, Tenable can focus on giving customers the business insights and actionable intelligence they need from an exposure management platform.
How Drata’s Continuous Compliance Solution Helps SaaS Providers Streamline Compliance on AWS
Learn how Drata’s suite of continuous automated compliance solutions can help accelerate SaaS providers’ journey to compliance frameworks. These solutions allow customers, such as SaaS providers, to monitor their diverse workload spread across multiple accounts, and customize the controls they need to apply for their chosen compliance framework, and any of the other 14+ frameworks to which Drata has mapped their controls.
Kiteworks Accelerates Private Content Network Provisioning with Automation on AWS
Securing digital communications across omnichannel depends on the tools used by the organization. Kiteworks delivers a dedicated Private Content Network (PCN) to unify, track, control, and secure the private information interchanged between organizations and their trusted partners like consultants, customers, and suppliers. Learn how Kiteworks uses AWS for infrastructure provisioning, data protection, and automation of its PCN.
Automate Security and Monitoring with Amazon EKS Blueprints, Terraform, and Sysdig
Many companies report the biggest challenge when adopting Kubernetes is a lack of in-house skills. Infrastructure as code (IaC) blueprints can mitigate these gaps by accelerating hands-on experience, providing a reproducible foundation to configure, provision, and destroy clusters easily. Learn how Sysdig launched an add-on for Amazon EKS as well as Sysdig EKS Blueprints to enable organizations to confidently deploy instrumented Kubernetes clusters using Terraform.
Integrating Malware Scanning into Your Data Ingestion Pipeline with Antivirus for Amazon S3
Antivirus for Amazon S3 by Cloud Storage Security (CSS) is a self-hosted malware solution, installed in the customer’s AWS account so data doesn’t leave the customer’s AWS account. Learn how to easily scan your workloads using Antivirus for Amazon S3, and how to integrate malware scanning into your data ingestion pipeline. Cloud Storage Security is an AWS Security Competency Partner that helps prevent the spread of malware and locates sensitive data for applications and data lakes that use AWS manages services.
Improve Your Security Posture with Claroty xDome Integration with AWS Security Hub
Industrial digital transformation is driving changes to the operational technology (OT) landscape, making it more connected to the internet, IT systems, and solutions. With OT/IT convergence, there is greater access to critical OT systems and increasing susceptibility to malware and ransomware. Learn how Claroty xDome and AWS Security Hub can be used for security and vulnerability monitoring, and to provide visibility of security events to teams responsible for operational monitoring.
Just-in-Time Least Privileged Access to AWS Administrative Roles with Okta and AWS Identity Center
AWS provides a rich set of tools and capabilities for managing access to cloud architectures including AWS IAM Identity Center, which makes it easy to manage access across your entire organization. Learn how AWS customers can leverage Okta Access Requests and AWS IAM Identity Center to provide just-in-time access to cloud resources. Granting just-in-time access to developers for a limited time based on approval is an effective way to limit the active time frame for assignments to your AWS resources.
Protect Your Web Applications with AWS WAF Ready Partners
As organizations continue to build and migrate more of their applications in the cloud, ensuring websites and applications are protected from external threats has become a top concern for businesses of all shapes and sizes. We’re excited to announce the AWS WAF Ready specialization to help customers deploy and maintain their application layer security solution with AWS WAF Ready Partner software products.
Streamline Multi-Account Governance, Management, and Security with AWS Control Tower and Mphasis Stelligent
Many organizations decide to implement AWS Control Tower because it provides an easy way to set up and govern a secure, multi-account AWS environment called a landing zone. Mphasis Stelligent offers an AWS Control Tower-based landing zone quick start with modules for automating account access, observability, security suite enablement, deploying industry-specific guardrails, and multi-account networking. Once implemented, companies can provision secure accounts fully baselined for utilization in less than an hour.
Continuous Compliance at Scale in AWS CI/CD Pipelines Using Pulumi CrossGuard
To ensure cloud infrastructure is compliant with organizational policies and regulatory requirements, many platform engineering teams are embedding the policy-as-code practice into their DevSecOps toolchain. Learn how to use Pulumi and its CrossGuard policy-as-code feature to ensure your infrastructure is compliant before it’s ever provisioned in AWS. We’ll also demonstrate how to define custom policies in Python, and how to create a reusable package of policies by storing them in AWS CodeArtifact.