AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

6pillars-APN-Blog-120822

Infrastructure Auto-Remediation on AWS with 6pillars and AWS Well-Architected Integration

The AWS Well-Architected Framework defines six pillars of cloud best-practices, and automation has matured to the point where it’s ready to support customers’ growing sophistication and appetite for efficiency. Learn how 6pillars’ dedication to automation-first and integration with AWS-native tools enables customers to deploy automation of AWS best practices quickly, safely, and cost-effectively. This drives significant benefits to customers seeking to adhere to multiple compliance standards.

MOTON-Consulting-APN-Blog-120822

How IAM Health Cloud Helps You Manage AWS IAM Even When You Have Multiple Accounts

IAM Health Cloud is a SaaS solution available in AWS Marketplace that enables continuous and central collection and analysis of all AWS Identity and Access Management (IAM) data for determining a company’s IAM posture across any number of AWS accounts. Learn how to use IAM Health Cloud to gain near real-time centralized insight of all IAM assets across multiple AWS accounts, even if they are independent or part of fragmented AWS Organizations.

ASCENDING-APN-Blog-113022

Data Governance Across AWS Organizations for Security and Compliance

Data governance serves an important role in ensuring the quality, consistency, and security of data utilized across an organization. Using a multi-account structure with cross-account access is an AWS best practice that offers several other benefits. Learn how to set up a data governance system in AWS Organization accounts with clients’ use cases and solutions, and how ASCENDING overcame the technical challenges listed above.

Tetrate-APN-Blog-113022

Automate Istio-Enabled Amazon EKS Cluster Deployment with Tetrate’s EKS Blueprints Add-On

Istio and Envoy have become key technologies in the modern application stack, especially for enterprises adopting Zero Trust security standards for microservices applications. Using standardized tooling from AWS and Tetrate, it’s easier than ever to fully integrate Amazon EKS and Istio into modern, declarative IaC deployment processes. Learn how to use EKS Blueprints with Tetrate’s Istio add-on to stand up fully bootstrapped clusters.

Understand and Prioritize Risk Amplifiers Within Your Cloud with AWS Services and Sonrai Dig

Sonrai Dig is a platform built from the ground up to solve threats to your cloud through early recognition of significant risks, which can prevent the exploitation and monetizing of your data. With one platform, you get contextual integration of investments in AWS, as well as normalization of those same capabilities across multi-cloud deployments. Together, Sonrai Dig, Amazon Inspector, and Amazon GuardDuty complement each other’s ability to find and categorize risk urgency.

Palo-Alto-Networks-APN-Blog-112622-1

Securing the 5G Network on AWS with Palo Alto Networks

Security is job zero at AWS and is one of the most important design principles of a Well-Architected Framework. Learn how to implement a 5G end-to-end security model based on Zero Trust principles using Palo Alto Networks’ 5G-native security solution for highly distributed and cloud-native 5G networks—with containerized 5G security and real-time threat correlation among 5G users, device identifiers, and a 5G network slice.

Orca-Security-APN-Blog-111522

Wix Combines Amazon GuardDuty and Orca Security to Provide Enterprise-Grade Security for Over 230 Million Users

The security team at Wix, a global leader in providing a comprehensive, cloud-based platform for web development, needed to reduce and prioritize the number of alerts and get a deeper dive into their cloud infrastructure stack. They sought to understand issues and vulnerabilities that could possibly be exploited and gain more context pertaining to incidents. Learn how Orca Security and Amazon GuardDuty helped prioritize detected alerts based on the severity of a security issue, its accessibility, and business impact.

DuploCloud-APN-Blog-110122

Provisioning Secure and Compliant Applications on AWS with DevSecOps and DuploCloud

It has become increasingly important for companies to meet security and compliance standards set forth across industries today, but this is particularly a hurdle for smaller ISVs and startups that do not have the resources and budget to navigate the ever-growing list. Learn about an approach and best practices for SOC 2 compliance, and how DuploCloud accelerates time to compliance by natively integrating security controls into mainstream DevOps workflows.

Smarsh-APN-Blog-110122

Keeping Pace with FinServ Regulatory Compliance Demands with Smarsh and AWS

Enterprises require the ability to be proactive on modern governance challenges. The difficulty is knowing what data you have, where it’s located, its business value or risk to the organization, and how it can be protected. The Smarsh Enterprise Platform enables companies to capture, retain, analyze, and act on the “signals” in communications that are most critical to the business. These include compliance and brand risks and may expand to include security threats, cultural indicators, untapped revenue opportunities, and more.

ATO-on-AWS-Canada-Launch-1

ATO on AWS Program Now Supporting Customers in Canada

Even the most technically astute organizations can find it challenging to conform to such requirements and do so efficiently. The Authority to Operate (ATO) on AWS partner program supports Amazon Web Services (AWS) customers overcome these hurdles by building a community of vetted, expert partners. While the ATO on AWS program was originally launched in the United States, it has begun supporting customers globally and we are excited to formally launch the program in Canada.