🚀 Exciting news! We just published our first LinkedIn article on how Amazon Macie can streamline data security by automatically identifying and labeling sensitive information in S3 buckets. Discover how this tool helps organizations enhance compliance while minimizing costs.
CloudNation’s Post
More Relevant Posts
-
Lots of customers have been looking to use Amazon OpenSearch to create detections and analyse security logs centralised and normalised by Amazon Security Lake. In part 1 of this 2 part blog post series, I walk you through how to plan and deploy an OpenSearch service cluster that can do just that! Stay tuned for part 2 where we guide you on how to use OpenSearch Security Analytics to create detection and alerting rules! Thanks to Kevin Fallis, Scott Ward, Kimberly Dickson, Praveen S., Muhammad Ali, Scott Damell, Anna Brinkmann, and Ivy Lin for helping put this together! https://lnkd.in/gZwAQRxp
How to deploy an Amazon OpenSearch cluster to ingest logs from Amazon Security Lake | Amazon Web Services
aws.amazon.com
To view or add a comment, sign in
-
Happy Independence Day to Everyone🇮🇳✨ Day 67: Amazon S3 Advanced Security Features: Presigned URLs and Vault Lock🔐 📌 As part of our Day 67 of #90dayslearningchallenge and #90daysofcloud. 👨💻🔍 Table of contents 📍Introduction 📍What are S3 Presigned URLs? 📍Understanding S3 Vault Lock🔐 📍S3 Glacier Vault Lock🔐 📍Conclusion💡 Welcome to Day 67 of our AWS learning journey☁️✨Amazon S3 (Simple Storage Service) is a robust and versatile storage solution that caters to a wide range of use cases, from simple data storage to complex, secure applications. Two powerful features in S3 that enhance security and control over data access are Presigned URLs and Vault Lock, including Glacier Vault Lock. These features allow users to securely share and protect data in different ways. In this blog post, we will explore these features in detail. ☁️🚀 📌 Detailed Blog at➡ https://lnkd.in/dru-8DF9 #AWS #S3Bucket #S3Security #S3VaultLock #CloudComputing #OnlineLearning #CloudTraining #TechEducation #learninginpublic #AWSCertification #90dayslearningchallenge #AWSCommunity Stay tuned for more insights as we continue our AWS learning journey. If you have any questions or suggestions, feel free to leave a comment! ⚜ Happy Learning! 🌐🚀
S3 Security: Presigned URLs & Vault Lock
shaileshpashte.hashnode.dev
To view or add a comment, sign in
-
AWS customers can use Amazon Security Lake to centralize security data from a multitude of services, including AWS-native and ISV partner solutions. If your organization uses Security Lake, check out this AWS-authored article to learn more about how Amazon OpenSearch can help you perform analytics, visualization, and more across the data in your instance: https://hubs.li/Q02KmnKw0
How to deploy an Amazon OpenSearch cluster to ingest logs from Amazon Security Lake | Amazon Web Services
aws.amazon.com
To view or add a comment, sign in
-
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys Secure your mission-critical data with S3 Express One Zone's server-side encryption using KMS keys, combining top-notch performance and robust security for regulatory compliance. Read mode on following blog post!
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys
aws.amazon.com
To view or add a comment, sign in
-
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys Secure your mission-critical data with S3 Express One Zone's server-side encryption using KMS keys, combining top-notch performance and robust security for regulatory compliance. Read mode on following blog post!
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys
aws.amazon.com
To view or add a comment, sign in
-
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys Secure your mission-critical data with S3 Express One Zone's server-side encryption using KMS keys, combining top-notch performance and robust security for regulatory compliance. Read mode on following blog post!
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys
aws.amazon.com
To view or add a comment, sign in
-
Ex. AWS Ambassador | Lead Cloud Alliances Manager | Principal Solutions Architect | Full AWS-Certified (13/13) | First MLOps APN Competency in the World
Securing AWS Step Functions Workflows. 🔒 AWS Step Functions allows you to coordinate components of distributed applications as a series of steps. But how do you protect sensitive data used in your workflows? 🤔 AWS has a new feature that addresses this need! You can now encrypt the data in your workflows using keys that you create and manage with AWS Key Management Service (AWS KMS). This gives you full control over the encryption keys. 🗝️ To enable this: 1️⃣ Create a customer managed key in AWS KMS. 2️⃣ Reference the key ARN when starting your Step Functions execution. Your data remains encrypted throughout the workflow with your CMK! 🔐 This prevents access to sensitive data like personal information, even by AWS services. You maintain and audit the key access per your security policies. 📜 For details see the linked article! What other AWS services would you like to see integrate Customer Managed Keys? Let me know in the comments! 👇 https://lnkd.in/eJy-BsP7 #aws #amazon #dataanalytics #datascience #appdevelopment #softwaredevelopment #awsstep #awskms
Strengthening data security in AWS Step Functions with a customer-managed AWS KMS key | Amazon Web Services
aws.amazon.com
To view or add a comment, sign in
-
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys Secure your mission-critical data with S3 Express One Zone's server-side encryption using KMS keys, combining top-notch performance and robust security for regulatory compliance. Read mode on following blog post!
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys
aws.amazon.com
To view or add a comment, sign in
-
Content delivery networks (#CDNs) such as Amazon CloudFront generate a flood of log files. In today’s world where your customers are all around the globe, it's important to make sure that your websites’ application assets are as close to the users as possible. Amazon makes it incredibly easy to enable logging for your specific CloudFront distribution — and will automatically send your logs to an Amazon S3 bucket of your choosing. Unfortunately, in order to get any value out of your log files, you would need to ingest them into a separate database, like OpenSearch or AWS Redshift. Maybe you are trying to track and analyze your bandwidth per distribution. Or perhaps you are trying to identify bot traffic by analyzing your top user agent strings per endpoint. Regardless of the goal you’re trying to accomplish, it can be difficult to get the detailed information you need to get from your logs without creating complex data pipelines or moving data out of S3. Explore some of the most common use cases for CloudFront logging, key challenges with analyzing this data, and a simplified approach to AWS CloudFront troubleshooting and analysis in S3: https://bit.ly/4bFdkS7
How to Quickly Analyze CloudFront Cloud Logs in Amazon S3
chaossearch.io
To view or add a comment, sign in
-
The Amazon Connect granular access control coverage just got expanded to include prompts and hours of operation resource configuration. What does that mean to you? Customers care about access control because it helps protect sensitive records, and ensures that large data sets are manageable and pertinent to users. For example an administrator might mark voice prompts used in the claims department with the Department:Claims tag, then only allow users from the claims department whose security profile opens up their access to the prompts configuration page, access those prompts. The current tagging support matrix can be found here: https://lnkd.in/ggjqmiQn
Tagging resources in Amazon Connect
docs.aws.amazon.com
To view or add a comment, sign in
4,081 followers