AWS Partner Network (APN) Blog
Category: Security, Identity, & Compliance
Data De-Identification in Healthcare: A 360-Degree View from Apexon
In the healthcare industry, the exchange of data incurs risks as it contains personally identifiable information (PII) and protected health information (PHI). At the same time, not exchanging the data can keep valuable insights hidden. Apexon’s data anonymization and de-identification solution uses sophisticated machine learning algorithms to ensure the exchange of data happens without any risk of PII/PHI being exposed, while allowing organizations to meet compliance and regulatory requirements.
Implementing Zero-Trust Workload Security on Amazon EKS with Calico
Amazon EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.
Managing Cybersecurity Risks with the Next Generation of Managed Security Services
Both AWS and Deloitte understand that a customer’s cloud journey is different and have their own set of requirements. This is why Deloitte’s Cyber CMS solution provides a wide range of options for businesses to choose from to create the right package for them. Learn how Cyber CMS can help organizations become more trustworthy, resilient, and secure through proactive management of cyber risks.
Introducing AWS Level 1 MSSP Competency Specialization Categories
The AWS Level 1 MSSP Competency makes it easy for customers to quickly find validated solution providers qualified to deliver solutions that have been uniquely designed for cloud environments. We are excited to announce specialization categories for the AWS Level 1 MSSP Competency. These categories help customers find the ideal solution provider based on the specific managed security need they are facing. We invite you to explore the following Level 1 MSSP Partner offerings recommended by AWS.
Introducing New Categories of AWS Security Competency Partners
The security landscape continues to evolve, making it a challenge for customers to modernize and stay up to date with use cases and threats. We are excited to expand the AWS Security Competency with eight new categories to help customers find and acquire a range of partner services and software, all of which are validated by AWS and address a full suite of security use cases. To keep up with the fast pace of the security marketplace, these categories will expand over time with additional use cases.
How to Mask Sensitive Data on AWS Using DataMasque
DataMasque is an AWS Partner that removes sensitive data from the databases and replaces it with realistic and functional masked values that enable effective development, testing, and analytics. This empowers AWS customers to do secure deployments in testing or non-production environments while mitigating the data breach security risks and allowing relevant teams to focus on development and testing of their applications without hinderance.
How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance
Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.
Securing AWS Accounts with Azure Active Directory Federation
With AWS Identity and Access Management (IAM), AWS provides a central way to manage user identities and permissions. However, creating and managing the lifecycle of IAM users in AWS can be time-consuming. This post explores how to authenticate users against Azure AD for access to one or multiple AWS accounts using SAML federation. Additionally, it includes a walkthrough on how to setup the federation across Azure AD and multiple AWS accounts.
Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax
Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.
Anomali Launches Differentiated Cloud-Native XDR SaaS Solution with Support from AWS SaaS Factory
To help organizations defend themselves against cyber threats, Anomali, a leader in intelligence-driven cybersecurity solutions, recently launched its cloud-native extended detection and response (XDR) solution, The Anomali Platform. The AWS SaaS Factory team spoke with Mark Alba, Chief Product Officer at Anomali, to learn more about Anomali Cloud-Native XDR SaaS, the value its new solution brings to customers, and the key lessons learned from the journey to SaaS on AWS.