Did you miss our big event in Las Vegas? Don't worry. We got you covered. Here's what's newly launched for all things security🔐
See below (in no particular order)⬇️
New for #AWSControlTower – Comprehensive Controls Management makes it easier for regulated customers to make AWS available for use by their developers. Use it to apply managed preventative, detective, and proactive controls to accounts
#AmazonSecurityLake automatically centralizes security data from cloud, on-premises, and custom sources into a purpose-built data lake stored in your account. Automate your central management of security data
#AmazonMacie automated data discovery is a new capability that allows you to gain visibility into where your sensitive data resides on #AmazonS3 at a fraction of the cost of running a full data inspection across all your S3 buckets
#AmazonInspector support for Lambda Functions enables unified, continuous, and automated security vulnerability assessments for applications running on AWS Lambda
#AWSVerifiedAccess a new secure connectivity service that allows enterprises to enable local or remote secure access for their corporate applications without requiring a VPN
XKS is a feature of #AWSKMS that uses keys stored in systems outside of AWS. Store AWS KMS customer managed keys on a hardware security module that you operate on premises or at any location of your choice
#AmazonVerifiedPermissions allows you to focus on building simple authorization policies and your applications—instead of building an authorization engine for your multi-tenant consumer applications
#AWSWickr is an end-to-end encrypted enterprise communications service that offers advanced security features and facilitates one-to-one chats, group messaging, voice and video calling, file sharing, screen sharing, and more. Collaborate more securely📱
The following 5 workshops simulate multiple security events. Brought to you by the AWS Customer Incident Response Team (CIRT) 👇
1/During the Unauthorized IAM Credential Use - Simulation and Detection
workshop, you will simulate the unauthorized use of IAM credentials by using a script invoked within #AWSCloudShell ⏩ go.aws/3XU6zG7
2/At the Ransomware on S3 – Security Event Simulation and Detection workshop, you will use an AWS CloudFormation template to replicate an environment with multiple IAM users and five #AmazonS3 buckets ⏩ go.aws/3HdX8Ky
🛡️Get the current recommendations for implementing #AWSWAF to protect existing and new web applications 👇👇👇
1/Understand what type of threats your web applications may be facing. Web applications face different kinds of threats that #AWSWAF can help you mitigate, such as: