AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Palo-Alto-Networks-APN-Blog-112622-1

Securing the 5G Network on AWS with Palo Alto Networks

Security is job zero at AWS and is one of the most important design principles of a Well-Architected Framework. Learn how to implement a 5G end-to-end security model based on Zero Trust principles using Palo Alto Networks’ 5G-native security solution for highly distributed and cloud-native 5G networks—with containerized 5G security and real-time threat correlation among 5G users, device identifiers, and a 5G network slice.

Orca-Security-APN-Blog-111522

Wix Combines Amazon GuardDuty and Orca Security to Provide Enterprise-Grade Security for Over 230 Million Users

The security team at Wix, a global leader in providing a comprehensive, cloud-based platform for web development, needed to reduce and prioritize the number of alerts and get a deeper dive into their cloud infrastructure stack. They sought to understand issues and vulnerabilities that could possibly be exploited and gain more context pertaining to incidents. Learn how Orca Security and Amazon GuardDuty helped prioritize detected alerts based on the severity of a security issue, its accessibility, and business impact.

DuploCloud-APN-Blog-110122

Provisioning Secure and Compliant Applications on AWS with DevSecOps and DuploCloud

It has become increasingly important for companies to meet security and compliance standards set forth across industries today, but this is particularly a hurdle for smaller ISVs and startups that do not have the resources and budget to navigate the ever-growing list. Learn about an approach and best practices for SOC 2 compliance, and how DuploCloud accelerates time to compliance by natively integrating security controls into mainstream DevOps workflows.

Smarsh-APN-Blog-110122

Keeping Pace with FinServ Regulatory Compliance Demands with Smarsh and AWS

Enterprises require the ability to be proactive on modern governance challenges. The difficulty is knowing what data you have, where it’s located, its business value or risk to the organization, and how it can be protected. The Smarsh Enterprise Platform enables companies to capture, retain, analyze, and act on the “signals” in communications that are most critical to the business. These include compliance and brand risks and may expand to include security threats, cultural indicators, untapped revenue opportunities, and more.

ATO-on-AWS-Canada-Launch-1

ATO on AWS Program Now Supporting Customers in Canada

Even the most technically astute organizations can find it challenging to conform to such requirements and do so efficiently. The Authority to Operate (ATO) on AWS partner program supports Amazon Web Services (AWS) customers overcome these hurdles by building a community of vetted, expert partners. While the ATO on AWS program was originally launched in the United States, it has begun supporting customers globally and we are excited to formally launch the program in Canada.

Multi-Account Threat Intelligence Using AWS Organizations and Sumo Logic Cloud SIEM

DevSecOps teams are responsible for providing enhanced infrastructure observability while ensuring they have the ability to respond to security events in a matter of minutes across the entire organization. To address this challenge, Sumo Logic and AWS collaborated to build a solution that provides end-to-end security and incident management (SIEM) across an enterprise using AWS Organizations. This SIEM solution is based on the AWS Security Reference Architecture.

SaaS-Auth0-API-Gateway-thumbnail

Building a Secure SaaS Application with Amazon API Gateway and Auth0 by Okta

Most applications require a form of identity service to manage, authenticate, and authorize users. In SaaS applications, multi-tenancy adds specific challenges to this task. To meet these needs, SaaS builders must consider integrating with an identity service provider. AWS services such as Amazon Cognito or AWS Partner services like Auth0 provide deep expertise in the field and allow you to focus on your SaaS application’s value proposition while relying on a secure, feature-rich identity provider.

Best Practices from Infopercept on Malware Detection with YARA Rules and Shuffle SOAR

Cloud security is the top priority at AWS and the security partner ecosystem plays a critical role in building and executing security capabilities. Learn how Infopercept is leveraging Shuffle, an open-source general purpose security automation platform that can be used for building security playbooks. The key elements of Shuffle are ease of integration with AWS services, as well as open source-like integration with Yara malware analysis.

Trend-Micro-APN-Blog-101322

Migrate On-Premises Data to AWS and Secure it from Malware Using Trend Micro Cloud One – File Storage Security

Learn how you can securely migrate your data from an on-premises network file system (NFS) to Amazon S3 using AWS DataSync. We’ll also provide guidance on how Trend Micro Cloud One – File Storage Security can be implemented to perform malware scanning, as well as address compliance, needs such as PCI-DSS and HIPAA. Trend Micro is an AWS Security Competency Partner and global leader in cybersecurity, helping make the world safe for exchanging digital information.

Okta-APN-Blog-100422

Improve the Availability of Existing Okta IAM Federation Setup Using Multi-Region SAML Endpoints

Federation using SAML 2.0 enables customers to use their existing external IdP and avoid managing multiple sources of identities when accessing AWS accounts. This post builds on the recommendation of using regional SAML endpoints for failover by showing how you can configure Okta‘s federation with IAM to increase its availability. Learn how to configure Okta, an AWS Security Competency Partner, to utilize multiple regional AWS SAML sign-in endpoints that can be deployed at setup by the Okta admin.