AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

DataMasque-APN-Blog-071222

How to Mask Sensitive Data on AWS Using DataMasque

DataMasque is an AWS Partner that removes sensitive data from the databases and replaces it with realistic and functional masked values that enable effective development, testing, and analytics. This empowers AWS customers to do secure deployments in testing or non-production environments while mitigating the data breach security risks and allowing relevant teams to focus on development and testing of their applications without hinderance.

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

T-Systems-APN-Blog-062722

Securing AWS Accounts with Azure Active Directory Federation

With AWS Identity and Access Management (IAM), AWS provides a central way to manage user identities and permissions. However, creating and managing the lifecycle of IAM users in AWS can be time-consuming. This post explores how to authenticate users against Azure AD for access to one or multiple AWS accounts using SAML federation. Additionally, it includes a walkthrough on how to setup the federation across Azure AD and multiple AWS accounts.

Create AWS Accounts and Align to the CIS AWS Foundations Benchmark with Stax

Learn how the CIS AWS Foundations Benchmark helps organizations operate securely whilst examining the common challenges businesses face in its implementation. Stax can offer a solution to speed up AWS account creation while adhering to the CIS AWS Foundations Benchmark. Creating and configuring AWS accounts securely can be a time-consuming and tedious exercise. Competing priorities can result in rushed or inconsistent process, impacting security, agility, and velocity.

Anomali-APN-Blog-061622

Anomali Launches Differentiated Cloud-Native XDR SaaS Solution with Support from AWS SaaS Factory

To help organizations defend themselves against cyber threats, Anomali, a leader in intelligence-driven cybersecurity solutions, recently launched its cloud-native extended detection and response (XDR) solution, The Anomali Platform. The AWS SaaS Factory team spoke with Mark Alba, Chief Product Officer at Anomali, to learn more about Anomali Cloud-Native XDR SaaS, the value its new solution brings to customers, and the key lessons learned from the journey to SaaS on AWS.

VGS-APN-Blog-060622

A FinTech Roadmap to Data Security and Compliance with VGS and AWS

To meet compliance like PCI-DSS, SOC2, and HIPAA, a customer typically has to change their architecture and workload, which can take significant time, money, and effort. With Very Good Security (VGS), customers retain full control over their data while offloading information security burdens, transferring the risk of a data breach, and fast-tracking compliance. VGS acts as a secure layer between your company and sensitive data.

DevSec-Ops-Competency-Launch-1

AWS DevOps Competency Expands to Include DevSecOps Category

With proper DevSecOps implementation, security becomes an integral part of the application delivery pipeline, allowing developers to receive rapid and contextual feedback as they build new features. The new DevSecOps category for the AWS DevOps Competency makes it easy for customers to find validated AWS Partners with DevSecOps products. These partners can help customers build secure applications by integrating security controls and policies into their application delivery pipelines.

GA-Telesis-APN-Blog-032322

GA Telesis Launches a Fraud Detection SaaS Solution with Support from AWS SaaS Factory

With the support of AWS SaaS Factory, GA Telesis launched the FraudBlock SaaS solution, a fraud protect API service for companies to protect their organizations from BEC/EAC scams and help securely perform B2B transactions. The SaaS Factory team spoke with Darryl Maraj, Head of Technology at DIG and CTO at Blockrails, to learn more about Blockrails, the value its new FraudBlock solution brings to customers, and the key lessons learned building a SaaS solution on AWS.

IronNet-APN-Blog-030422

Protecting Your Deployments from Advanced Threats with AWS and IronNet

Working with AWS, IronNet delivers threat detection and mitigation at scale across networks that are on premises, in the cloud, or both. IronNet collects logs and traffic data to identify indicators of attack or abnormal behavior in order to stop advanced cyberattacks. At its foundation, the IronNet solution consists of one or more sensors to feed network data and logs to IronDefense—the backend collection and analysis point for detection.

Defense-in-Depth Principles for Protecting Workloads with CrowdStrike and AWS

Migrating to the cloud has allowed many organizations to reduce costs, innovate faster, and deliver business results more effectively. Managing, securing, and having visibility across endpoints, networks, and workloads is not an easy feat and requires a unified defense-in-depth approach. Learn how CrowdStrike’s leading endpoint protection, workload protection, and threat intelligence directly integrate with AWS services to build an effective defense-in-depth solution to stay ahead of threats.