Category: Advanced (300)

1 2 3 5 10 / 42 POSTS
Best practices and advanced patterns for Lambda code signing

Best practices and advanced patterns for Lambda code signing

Amazon Web Services (AWS) recently released Code Signing for AWS Lambda. By using this feature, you can help enforce the integrity of your code artifa [...]
Deploy an automated ChatOps solution for remediating Amazon Macie findings

Deploy an automated ChatOps solution for remediating Amazon Macie findings

The amount of data being collected, stored, and processed by Amazon Web Services (AWS) customers is growing at an exponential rate. In order to keep p [...]
How to visualize multi-account Amazon Inspector findings with Amazon Elasticsearch Service

How to visualize multi-account Amazon Inspector findings with Amazon Elasticsearch Service

Amazon Inspector helps to improve the security and compliance of your applications that are deployed on Amazon Web Services (AWS). It automatically as [...]
Detecting sensitive data in DynamoDB with Macie

Detecting sensitive data in DynamoDB with Macie

Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your se [...]
Use Macie to discover sensitive data as part of automated data pipelines

Use Macie to discover sensitive data as part of automated data pipelines

Data is a crucial part of every business and is used for strategic decision making at all levels of an organization. To extract value from their data [...]
How to protect a self-managed DNS service against DDoS attacks using AWS Global Accelerator and AWS Shield Advanced

How to protect a self-managed DNS service against DDoS attacks using AWS Global Accelerator and AWS Shield Advanced

In this blog post, I show you how to improve the distributed denial of service (DDoS) resilience of your self-managed Domain Name System (DNS) service [...]
Techniques for writing least privilege IAM policies

Techniques for writing least privilege IAM policies

In this post, I’m going to share two techniques I’ve used to write least privilege AWS Identity and Access Management (IAM) policies. If you’re not fa [...]
Centrally manage AWS WAF (API v2) and AWS Managed Rules at scale with Firewall Manager

Centrally manage AWS WAF (API v2) and AWS Managed Rules at scale with Firewall Manager

Since AWS Firewall Manager was introduced in 2018, it has evolved with many more features and today also supports the newest version of AWS WAF, as we [...]
Investigate VPC flow with Amazon Detective

Investigate VPC flow with Amazon Detective

Many Amazon Web Services (AWS) customers need enhanced insight into IP network flow. Traditionally, cost, the complexity of collection, and the time r [...]
Round 2 post-quantum TLS is now supported in AWS KMS

Round 2 post-quantum TLS is now supported in AWS KMS

AWS Key Management Service (AWS KMS) now supports three new hybrid post-quantum key exchange algorithms for the Transport Layer Security (TLS) 1.2 enc [...]
1 2 3 5 10 / 42 POSTS
Close Bitnami banner
Bitnami