AWS Marketplace
Category: AWS Identity and Access Management (IAM)
Deploy CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace
This post outlines the deployment process for CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace. The key business impact is the introduction of a streamlined, automated deployment experience that reduces complex configurations across AWS Organizations to minutes. The solution provides unified security monitoring, analysis, detection, and response capabilities through a pay-as-you-go model.
Building a real-time recommendation engine with Amazon MSK and Rockset
In this post, we demonstrated how to build a real-time product recommendation engine by leveraging the fully managed streaming capabilities of Amazon MSK, along with the real-time analytics and SQL capabilities of Rockset.
Simplifying buyer procurement workflow integration with AWS Marketplace
In this post, we share an approach using selected AWS features that help govern how buyers use your organization’s procurement workflows for their AWS Marketplace subscriptions. We show you how to integrate these features into your procurement workflow with AWS Marketplace subscriptions with minimal effort.
Setting up fine-grained permission access for AWS Marketplace sellers
In this blog post, we show you how to adopt fine-tuned granular IAM control using 17 new AWS Marketplace fine-grained permission policies. We also show how to use policies to set up permissions for tax officers, banking officers, and Know Your Customer users. And you will learn what policies to use to replace two deprecated policies.
Streamlining and fast-tracking vendor risk assessments with AWS Marketplace Vendor Insights
In this post, I show how to use AWS Marketplace Vendor Insights to access security profiles associated with vendor products listed in AWS Marketplace. The AWS Marketplace Vendor Insights dashboard presents compliance artifacts and security control information for software products to help buyers complete their vendor risk assessment.
CyberArk Identity as SSO for AWS Control Tower
Migrating to the AWS cloud has enabled many organizations to reduce costs, innovate faster, and deliver business results more effectively. As you expand your AWS infrastructure, you require multi-account governance strategies as well as implementation of best practices to your expanded environment. AWS Control Tower implements AWS best practices to establish a well-architected, multi-account baseline […]
Enhance digital security by automating certificate management with CLMaaS in AWS Marketplace
Cryptography and digital certificates are the security backbone of modern digital enterprises. An automated certificate lifecycle management (CLM) solution helps you efficiently manage your certificates, and, in turn, bolster your security posture. Digital transformation, cloud migration, remote work, and Internet of Things (IoT) create growth opportunities for organizations. However, they also bring security challenges of […]
Securing your AWS Control Tower multi-account environment with Lacework
For enterprise organizations, managing security and governance across hundreds or thousands of accounts can be challenging. AWS Control Tower and Lacework make this task much easier and enable seamless multi-account cloud security. By using Lacework in your AWS Control Tower environment, you can automatically and consistently apply security best practices and monitoring to new accounts […]
Automate multi account identity governance in AWS using Ermetic and AWS Control Tower
Having a multi-account strategy is a best practice for achieving higher isolation of resources in AWS. It helps you to meet regulatory and compliance needs, track operational costs, and add an extra layer of security. AWS Control Tower uses AWS best practices to establish a well-architected, multi-account baseline across your AWS accounts. For more information […]
Demonstrating least privilege with Sonrai Security and AWS Control Tower
During the cloud journey, some of my customers must create identity principals, such as roles or users. Engineers or services use these roles to perform their jobs in the cloud. To support this effort, Sonrai Security has developed an integration with AWS Control Tower. This integration enables you to see all of the security policies […]








