Click any tag below to further narrow down your results
Links
This article explains how to integrate FortiGate Next-Generation Firewall (NGFW) with AWS Gateway Load Balancer for improved security in hybrid environments. It highlights the benefits of centralized traffic inspection and policy management, simplifying compliance and threat prevention. A free 30-day trial is available for evaluation.
Amazon CloudWatch now allows users to enable deletion protection for their log groups. This feature prevents accidental deletions, ensuring critical operational and compliance logs are preserved. Administrators can activate this protection during log group creation or for existing groups.
AWS introduced VPC encryption controls to help organizations enforce encryption for traffic within and between VPCs. The feature offers two modes: monitor and enforce, allowing users to audit encryption status and ensure compliance with regulations. It simplifies the process of maintaining encryption across cloud infrastructure without significant performance impact.
Amazon S3 now allows users to change the server-side encryption type of existing objects without moving data. You can use the UpdateObjectEncryption API to switch between encryption methods, such as from SSE-S3 to SSE-KMS, and apply these changes at scale with S3 Batch Operations. This is particularly useful for meeting compliance and security standards.
AWS Control Tower now offers improved visibility into proactive controls through the AWS CloudFormation Hook Invocation Summary console. This enhancement helps teams quickly identify and resolve deployment issues caused by policy violations, streamlining compliance and reducing troubleshooting time.
A comprehensive solution for automating resource tagging across AWS Organizations is presented, utilizing CloudFormation, Lambda functions, and AWS Config to maintain consistent tags across multiple accounts. The implementation streamlines compliance monitoring and resource governance by automating the tagging process and propagating tags from organizational units to child accounts. Key components include cross-account role management and error handling, ensuring effective resource management in production environments.
Setting up a secure environment for malware analysis on AWS involves addressing unique security, compliance, and operational challenges. Key elements include creating isolated sandboxes, enforcing strict access controls, and implementing robust monitoring and lifecycle management to prevent misuse and maintain adherence to AWS policies.
AWS Config enables tracking of configuration changes across AWS resources, with two recording options: continuous and periodic. Choosing the right recording frequency is essential for operational visibility, compliance, and security, depending on factors like resource staticity, relationships, and baseline change frequency. Best practices help optimize resource inventory and compliance reporting while managing costs effectively.
Cloud Snitch is a powerful tool designed to enhance your understanding of AWS account activity, providing an intuitive interface for exploring and documenting AWS principals, IP addresses, and network activity. It helps users quickly identify errors and suspicious behavior, while also allowing for the generation and management of service control policies to enforce security compliance. Open-sourced under the MIT license, it can be deployed easily or used through cloudsnitch.io.
Cloud logging best practices are essential for organizations migrating to cloud environments, helping them meet security, regulatory, and business needs. By understanding the differences between data and control plane logging across major cloud service providers, organizations can develop a customized logging framework that optimizes visibility and compliance. Collaboration with legal and compliance teams is crucial for navigating regulatory requirements and ensuring effective logging strategies.