AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Ensono-APN-Blog-102523

Using AWS Trusted Advisor to Drive Operational Excellence with Ensono Envision Advisor

AWS Trusted Advisor inspects your AWS environment and provides recommendations to optimize infrastructure, improve security and performance, reduce cost, and monitor service quotas. Ensono Envision Advisor turns AWS Trusted Adviser recommendations into validated, prioritized, actionable insights. It ingests data before enriching it with Ensono IP to contextualize recommendations specific to end customers, making it easier to achieve operational excellence on AWS.

MP-SaaS-Security-featured

From Idea to Market: AWS Marketplace Vendor Insights for Secure SaaS

In this post, AWS experts provide a step-by-step guide on how to navigate and leverage the AWS Partner Network (APN) and AWS Marketplace, depending on where you are in your development journey. We’ll demonstrate how your security and engineering teams can integrate continuous compliance controls and how to add compliance reports and certifications to your product profile as you obtain them. Finally, we’ll show the AWS customer’s experience of obtaining access to your product’s security information.

BeyondTrust’s Identity Security Insights SaaS Offering, Supported by AWS SaaS Factory

Delve into the BeyondTrust Identity Security Insights solution and its capacity to provide organizations with a comprehensive understanding of all identities, privileges, and access, thereby illuminating their direct influence on security posture. As we navigate through an era where cloud solutions are an indispensable component of business strategies and automation is deeply integrated into daily operations, the focal point has undeniably shifted towards identity security

Navigating Security Challenges and Committing to the Cloud with Axonius and AWS

Starting a cloud migration process without a comprehensive and contextual understanding of your assets can be challening. With all of the advantages a cloud environment can provide, let’s dive into how you can get started. In this post, dive into how Axonius Cybersecurity Asset Management together with AWS migration services can help lay a foundation for a customer’s cloud migration strategy.

Kubecost-APN-Blog-101823

Authenticate Kubecost Users with Application Load Balancer and Amazon Cognito

Amazon EKS has a collaboration with Kubecost, a Kubernetes and cloud cost management tool that helps customers monitor, track, optimize, and govern their cloud and Kubernetes spending. Kubecost can be installed easily in a few minutes, but many customers are looking for a cloud-native way to expose Kubecost UI for their internal team to access the costs report. This post describes how to authenticate Kubecost users via Application Load Balancer and Amazon Cognito.

Securing 5G Core Applications on AWS Snowball Edge with Palo Alto Networks

The security pillar of the AWS Well-Architected Framework describes how to take advantage of cloud technologies to protect data, systems, and assets in a way that improves security posture. The security pillar doesn’t just apply to AWS regions and Availability Zones but also to hybrid cloud solutions on premises. In this post, we’ll focus on security using AWS Snowball Edge and how Palo Alto Network’s VM-Series firewall is deployed and configured to secure access to a 5G core application providing cellular 5G connectivity.

How to Streamline HITRUST Compliance with AWS and A-LIGN

Originally focused on healthcare, HITRUST is now used by organizations across industries to demonstrate regulatory compliance and risk management to a global audience. Learn how organizations can enhance the efficiency of their HITRUST compliance with A-LIGN’s compliance automation platform. A-SCEND integrates with AWS to automate evidence collection and continuously monitor cloud security in accordance with Center for Internet Security benchmarks.

Automating Secure and Scalable Website Deployment on AWS with Amazon CloudFront and AWS CDK

There is no easier way to run HTTPS-enabled static websites on AWS than by using Amazon CloudFront and Amazon S3. In this post, we’ll look at automating website deployment on AWS using AWS Cloud Development Kit (AWS CDK) and TypeScript. We’ll use the architecture that combines CloudFront as the content delivery network, AWS Certificate Manager for secure certificate provisioning, Amazon S3 for reliable website hosting, and Amazon Route 53 as the domain name system.

Malware Scanning for Regulated Workloads on AWS with Cloud Storage Security

Many of the requirements for meeting and maintaining a secure environment can be met by using AWS FedRAMP-authorized regions and services, which can simplify and reduce costs of the process. Over 2,000 government agencies and other entities that provide services to government agencies are using AWS services today. Learn how Antivirus for Amazon S3 by Cloud Storage Security can be used to automate malware scanning for application workflows or data ingestion pipelines to achieve data security and compliance.

Security-Competency-DSPM-TEAM-featured

AWS Security Competency Adds DSPM and TEAM Use Cases for ISV Partners

In today’s fast-evolving digital landscape, security remains a concern for organizations of all sizes. As the threat landscape evolves, so do the solutions that address these challenges. The AWS Security Competency for ISVs aligns partner cyber security offerings to the needs of AWS customers, which is why the program now includes the “Data Security Posture Management” use case in the Data Protection category, and the “Temporary Elevated Access Management” use case in the Identity and Access Management category.