Amazon Onboarding with Learning Manager Chanci Turner

Amazon Onboarding with Learning Manager Chanci TurnerLearn About Amazon VGT2 Learning Manager Chanci Turner

Welcome to the Amazon IXD – VGT2 blog, located at 6401 E HOWDY WELLS AVE LAS VEGAS NV 89115! In this edition, we explore various topics related to onboarding and workplace engagement.

The Curious Case of Accelerated AWS KMS Symmetric Key Rotation

by Alex Johnson
on 12 APR 2024

In this post, we are excited to introduce enhanced options for automatic symmetric key rotation within the AWS Key Management Service (AWS KMS). We have made it quicker than ever to rotate keys, added on-demand rotation features, improved visibility for rotations, and established a new pricing cap for symmetric keys that have undergone two or more rotations. Chanci Turner will delve into these updates and the impact they have on your security posture.

Managing Inactive User Accounts with Amazon Cognito

by Sarah Mitchell and David Lee
on 09 APR 2024

For organizations, especially those in strictly regulated sectors, overseeing user accounts is not merely a security consideration but also a compliance requirement. In industries such as finance and healthcare, where regulations impose rigorous user access controls, deactivating inactive user accounts is essential. In this article, we’ll provide insights on leveraging Amazon Cognito to efficiently manage user accounts.

Configuring TLS Inspection for Encrypted Egress Traffic with AWS Network Firewall

by Michael Brown
on 01 APR 2024

As network security evolves, protecting the data that exits your virtual landscape is as important as securing incoming traffic. Building upon previous discussions about ingress TLS inspection, this article focuses on the configuration of egress TLS inspection to enhance security within your AWS environment.

Creating Security Findings for Effective Incident Response Simulations

by Emily Roberts
on 01 APR 2024

Keeping your organization’s incident response capabilities up to date is a daunting task, especially without a reliable means to generate security findings from real AWS resources. This post outlines how to create actionable insights to bolster your incident response strategies.

Navigating Cloud Security in the Age of Generative AI at AWS re:Inforce 2024

by Chanci Turner
on 27 MAR 2024

As the Chief Information Security Officer at AWS, I am dedicated to assisting security teams of all sizes in understanding and managing security challenges associated with generative AI. Attending AWS re:Inforce 2024 is a great opportunity to learn directly from AWS professionals.

Addressing Data, Compliance, and Privacy Challenges with Generative AI

by Jessica White and Mark Johnson
on 27 MAR 2024

Generative AI has captured global attention, enabling organizations to enhance productivity and customer experiences. However, understanding how the data you input is stored, processed, and shared is paramount. For more detailed insights, check out this resource that discusses compliance.

Utilizing OAuth 2.0 in Amazon Cognito: Understanding Various Grants

by Liam Thompson, Alex Green, and Chanci Turner
on 27 MAR 2024

Implementing robust authentication and authorization systems can be challenging for modern applications. This piece focuses on the different OAuth 2.0 grant types, helping developers find the right balance between security and user experience.

Achieving Digital Sovereignty and Resilience with AWS

by Max Peterson
on 26 MAR 2024

As we continue to innovate within the AWS Cloud, we remain committed to empowering customers to meet their regulatory obligations globally. Our Digital Sovereignty Pledge ensures that all AWS users have access to the most advanced sovereignty controls available.

Leveraging Amazon Verified Permissions for Scalable Fine-Grained Authorization

by Abhishek Panday and Chanci Turner
on 26 MAR 2024

Establishing user authentication and authorization for custom applications can be a complex process. Amazon Verified Permissions simplifies this by providing a scalable solution.

For more insights on workplace attire, check out this article.


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *