AWS Security

AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.

  • CISPE Data Protection Code of Conduct Public Register now certifies 122 AWS services as adherent
    by Gokhan Akyuz on June 23, 2025 at 6:55 pm

    We continue to expand the scope of our assurance programs at Amazon Web Services (AWS) and are pleased to announce that 122 services are now certified as adherent to the Cloud Infrastructure Services Providers in Europe (CISPE) Data Protection Code of Conduct. This alignment with the CISPE requirements demonstrates our ongoing commitment to adhere to the heightened expectations for

  • How to prioritize security risks using AWS Security Hub exposure findings
    by Shahna Campbell on June 19, 2025 at 4:44 pm

    At re:Inforce 2025, AWS unveiled an enhanced AWS Security Hub that transforms how organizations prioritize their most critical security issues and respond at scale to protect their cloud environments. In this blog post, we discuss how you can use Security Hub to prioritize these issues with exposure findings. The enhanced Security Hub now uses advanced

  • Empower AI agents with user context using Amazon Cognito
    by Abrom Douglas on June 18, 2025 at 4:33 pm

    Amazon Cognito is a managed customer identity and access management (CIAM) service that enables seamless user sign-up and sign-in for web and mobile applications. Through user pools, Amazon Cognito provides a user directory with strong authentication features, including passkeys, federation to external identity providers (IdPs), and OAuth 2.0 flows for secure machine-to-machine (M2M) authorization. Amazon

  • Secure your Express application APIs in minutes with Amazon Verified Permissions
    by Trevor Schiavone on June 17, 2025 at 4:08 pm

    June 23, 2025: We updated @verifiedpermissions/authorization-clients to @verifiedpermissions/authorization-clients-js to correctly reflect the name of the package on npm. Today, Amazon Verified Permissions announced the release of @verifiedpermissions/authorization-clients-js, an open source package that developers can use to implement external fine-grained authorization for Express.js web application APIs in minutes when using Verified Permissions. Express is a minimal

  • Improve your security posture using Amazon threat intelligence on AWS Network Firewall
    by Amit Gaur on June 17, 2025 at 4:03 pm

    Today, customers use AWS Network Firewall to safeguard their workloads against common security threats. However, they often have to rely on third-party threat feeds and scanners that have limited visibility in AWS workloads to protect against active threats. A self-managed approach to cloud security through traditional threat intelligence feeds and custom rules can result in

  • How AWS is simplifying security at scale: Four keys to faster innovation from AWS re:Inforce 2025
    by Amy Herzog on June 17, 2025 at 4:00 pm

    When I began my career in security, most people accepted as fact that protecting systems came at the expense of productivity. That didn’t have to be true then, and it’s definitely not true now. The cloud, and specifically the AWS Cloud, is a big reason why. But as technology evolves and systems become more complex,

  • Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities
    by Nirali Desai on June 17, 2025 at 3:54 pm

    Since launch, Amazon Inspector has helped customers automate vulnerability management for their running workloads on Amazon Elastic Compute Cloud (Amazon EC2), container workloads, and AWS Lambda functions. Today, we’re taking a step forward into more proactive security with the latest addition to Amazon Inspector: code security capabilities. By using this powerful new feature you can

  • Introducing the new console experience for AWS WAF
    by Harith Gaddamanugu on June 17, 2025 at 1:40 pm

    Protecting publicly facing web applications can be challenging due to the constantly evolving threat landscape. You must defend against sophisticated threats, including zero-day vulnerabilities, automated events, and changing compliance requirements. Navigating through consoles and selecting the protections best suited to your use case can be complicated, requiring not only security expertise but also a deep

  • How AWS improves active defense to empower customers
    by Stephen Goodman on June 16, 2025 at 9:02 pm

    At AWS, security is the top priority, and today we’re excited to share work we’ve been doing towards our goal to make AWS the safest place to run any workload. In earlier posts on this blog, we shared details of our internal active defense systems, like MadPot (global honeypots), Mithra (domain graph neural network), and Sonaris

  • How to create post-quantum signatures using AWS KMS and ML-DSA
    by Jake Massimo on June 13, 2025 at 6:11 pm

    As the capabilities of quantum computing evolve, AWS is committed to helping our customers stay ahead of emerging threats to public-key cryptography. Today, we’re announcing the integration of FIPS 204: Module-Lattice-Based Digital Signature Standard (ML-DSA) into AWS Key Management Service (AWS KMS). Customers can now create and use ML-DSA keys through the same familiar AWS

  • AI security strategies from Amazon and the CIA: Insights from AWS Summit Washington, DC
    by Danielle Ruderman on June 13, 2025 at 5:10 pm

    At this year’s AWS Summit in Washington, DC, I had the privilege of moderating a fireside chat with Steve Schmidt, Amazon’s Chief Security Officer, and Lakshmi Raman, the CIA’s Chief Artificial Intelligence Officer. Our discussion explored how AI is transforming cybersecurity, threat response, and innovation across the public and private sectors. The conversation highlighted several

  • AWS CIRT announces the launch of the Threat Technique Catalog for AWS
    by Steve de Vera on June 13, 2025 at 3:22 pm

    June 13, 2025: This post was updated to fix an incorrect link. Greetings from the AWS Customer Incident Response Team (AWS CIRT). AWS CIRT is a 24/7, specialized global Amazon Web Services (AWS) team that provides support to customers during active security events on the customer side of the AWS Shared Responsibility Model. We’re excited

  • Introducing the AWS Security Champion Knowledge Path and digital badge
    by Sarah Currey on June 12, 2025 at 5:27 pm

    June 16, 2025: We’ve updated this post to correct a typo in the pricing for team subscriptions. Today, Amazon Web Service (AWS) introduces the Security Champion Knowledge Path on AWS Skill Builder, featuring training and a digital badge. The Security Champion Knowledge path is a comprehensive educational framework designed to empower developers and software engineers

  • AWS completes Police-Assured Secure Facilities (PASF) audit in Europe (London) AWS Region
    by Vishal Pabari on June 11, 2025 at 3:53 pm

    We’re excited to announce that our Europe (London) AWS Region has renewed its accreditation for United Kingdom (UK) Police-Assured Secure Facilities (PASF) for Official-Sensitive data. Since 2017, the Amazon Web Services (AWS) Europe (London) Region has been accredited under the PASF program. This demonstrates our continuous commitment to adhere to the heightened expectations of customers

  • Building identity-first security: A guide to the Identity and Access Management track at AWS re:Inforce 2025
    by Rahul Sahni on June 10, 2025 at 9:59 pm

    Join us at AWS re:Inforce 2025 from June 16 to 18 as we dive deep into identity and access management, where we’ll explore how organizations are securing identities at scale. As the traditional security perimeter continues to dissolve in our hybrid and multi-cloud world, this year’s sessions showcase how AWS customers are building comprehensive identity-centric

  • Building secure foundations: A guide to network and infrastructure security at AWS re:Inforce 2025
    by Brandon Carroll on June 9, 2025 at 3:37 pm

    A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. Securing cloud infrastructure has never been more critical as organizations continue to expand their digital footprint and embrace modern architectures. At AWS re:Inforce 2025, the Network and Infrastructure Security track brings together security

  • 2025 ISO and CSA STAR certificates now available with three new Regions
    by Chinmaee Parulekar on June 6, 2025 at 8:06 pm

    Amazon Web Services (AWS) successfully completed an onboarding audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. EY CertifyPoint auditors conducted the audit and reissued the certificates on May 26, 2025. The objective of the audit was to assess

  • How to use on-demand rotation for AWS KMS imported keys
    by Jeremy Stieglitz on June 6, 2025 at 6:03 pm

    Today, we’re announcing support for on-demand rotation of symmetric encryption AWS Key Management Service (AWS KMS) keys with imported key material (EXTERNAL origin). This new capability enables you to rotate the cryptographic key material of these keys without changing the key identifier (key ID or Amazon Resource Name (ARN)). Rotating keys helps you meet compliance

  • Many voices, one community: Three themes from RSA Conference 2025
    by Anne Grahn on June 5, 2025 at 8:09 pm

    RSA Conference (RSAC) 2025 drew 730 speakers, 650 exhibitors, and 44,000 attendees from across the globe to the Moscone Center in San Francisco, California from April 28 through May 1. The keynote lineup was eclectic, with 37 presentations featuring speakers ranging from NBA Hall of Famer Earvin “Magic” Johnson to public and private-sector luminaries such as former

  • Implementing just-in-time privileged access to AWS with Microsoft Entra and AWS IAM Identity Center
    by Rodney Underkoffler on June 3, 2025 at 4:45 pm

    June 19, 2025: We made a correction to the windows of access that a user could have when using this solution. Controlling access to your privileged and sensitive resources is critical for all AWS customers. Preventing direct human interaction with services and systems through automation is the primary means of accomplishing this. For those infrequent

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.