Disabling Security Hub controls in a multi-account environment
by Alex Johnson, Sarah Kim, and Robert Smith
on 06 JAN 2022
in AWS Security Hub, Best Practices
As of February 28, 2024, Security Hub has introduced a central configuration feature that allows users to manage security standards and controls across multiple accounts. This enhancement simplifies many scenarios previously addressed by the scripts detailed in this blog post, significantly reducing or eliminating the necessity for running them. Before implementing the scripts mentioned here, it’s advisable to explore the Central configuration in this another blog post.
AWS re:Invent 2021 security track recap
by Emily Carter
on 06 JAN 2022
in Security, Identity, & Compliance
On June 13, 2022, we fixed the broken link to the ransomware talk by Megan O’Neil and Merritt Baer. Another AWS re:Invent has successfully concluded! We were delighted to host live events in Las Vegas once again this year. The participation was fantastic, and we were thrilled to have a large audience engage with us.
Automatically resolving Security Hub findings for non-existent resources
by Mark Adams, Julia Lee, and Chris Wong
on 04 JAN 2022
in Amazon EventBridge, AWS Security Hub, Security, Identity, & Compliance
In this article, you’ll discover how to automatically resolve AWS Security Hub findings for resources that have been deleted. By utilizing an event-driven approach, findings can be automatically addressed for both AWS and third-party service integrations. Security Hub offers a holistic view of your security alerts and overall security posture across AWS accounts. Security measures are crucial, and for more insights, visit this authoritative source.
Configuring an incoming email security gateway with Amazon WorkMail
by Daniel Brown
on 03 JAN 2022
in Amazon WorkMail, Best Practices, Business Productivity, Foundational (100), Security, Identity, & Compliance
On April 25, 2023, we revised this blog post to incorporate additional security learning materials. This guide outlines the steps needed to integrate Amazon WorkMail with an email security gateway, establishing a robust defense strategy against incoming email threats. Amazon WorkMail serves as a secure and managed email solution for businesses.
Comprehensive Cyber Security Framework for Primary (Urban) Cooperative Banks (UCBs)
by Laura Green
on 03 JAN 2022
in Announcements, Compliance, Financial Services, Security, Identity, & Compliance
We are pleased to present a new AWS workbook that assists India’s Primary Cooperative Banks (UCBs) in aligning with the Reserve Bank of India (RBI) guidelines on the Comprehensive Cyber Security Framework for UCBs – A Graded Approach. This resource complements the RBI’s foundational cyber security framework.
2021 FINMA ISAE 3000 Type 2 attestation report for Switzerland available on AWS Artifact
by Michael Johnson
on 21 DEC 2021
in Financial Services, Foundational (100), Security, Identity, & Compliance
AWS is excited to announce the release of the second ISAE 3000 Type 2 attestation report from the Swiss Financial Market Supervisory Authority (FINMA). This report covers the period from October 1, 2020, to September 30, 2021, including 141 AWS services and 23 global AWS Regions in its scope. A comprehensive list of certified services is also available.
Simplifying the setup of Amazon Detective with AWS Organizations
by Clara Davis and Tom Lee
on 20 DEC 2021
in Amazon Detective, Best Practices
Amazon Detective streamlines the process of analyzing, investigating, and identifying the root causes of potential security issues or suspicious activities by gathering log data from AWS resources. Detective simplifies the deep dive into security findings from other AWS security services, such as Amazon GuardDuty and AWS Security Hub.
Continuing runtime security monitoring with AWS Security Hub and Falco
by David White and Lisa Turner
on 17 DEC 2021
in Advanced (300), Best Practices, Security
Clients desire a unified and thorough view of the security posture of their workloads. Runtime security event monitoring is essential for creating secure, operationally sound, and reliable workloads, especially in environments utilizing containers and container orchestration platforms. This blog post illustrates how to leverage services like AWS Security Hub and Falco for enhanced monitoring.
Customizing AWS Managed Rules for AWS WAF
by Nina Patel and Chris Brown
on 10 DEC 2021
in Announcements, AWS WAF, Best Practices, Security, Identity, & Compliance, Technical How-to
AWS Managed Rules for AWS WAF includes a collection of rules designed by AWS to help protect against common application vulnerabilities and unauthorized access to your systems without the requirement of crafting your own rules. The AWS Threat Research Team frequently updates these Managed Rules to adapt to the constantly changing threat landscape.
Privacy video: Innovating securely
by Rachel Adams
on 09 DEC 2021
in Announcements, Foundational (100), Security, Identity, & Compliance
This is an excellent resource for those looking to deepen their understanding of security practices in innovation.
Amazon IXD – VGT2
6401 E Howdy Wells Ave, Las Vegas, NV 89115
Leave a Reply