AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.
- Secure root user access for member accounts in AWS Organizationsby Jonathan VanKim on November 22, 2024 at 2:17 pm
AWS Identity and Access Management (IAM) now supports centralized management of root access for member accounts in AWS Organizations. With this capability, you can remove unnecessary root user credentials for your member accounts and automate some routine tasks that previously required root user credentials, such as restoring access to Amazon Simple Storage Service (Amazon S3)
- Securing the RAG ingestion pipeline: Filtering mechanismsby Laura Verghote on November 19, 2024 at 9:51 pm
Retrieval-Augmented Generative (RAG) applications enhance the responses retrieved from large language models (LLMs) by integrating external data such as downloaded files, web scrapings, and user-contributed data pools. This integration improves the models’ performance by adding relevant context to the prompt. While RAG applications are a powerful way to dynamically add additional context to an LLM’s prompt
- Important changes to CloudTrail events for AWS IAM Identity Centerby Arthur Mnev on November 19, 2024 at 6:20 pm
AWS IAM Identity Center is streamlining its AWS CloudTrail events by including only essential fields that are necessary for workflows like audit and incident response. This change simplifies user identification in CloudTrail, addressing customer feedback. It also enhances correlation between IAM Identity Center users and external directory services, such as Okta Universal Directory or Microsoft
- Threat modeling your generative AI workload to evaluate security riskby Danny Cortegaca on November 18, 2024 at 2:00 pm
As generative AI models become increasingly integrated into business applications, it’s crucial to evaluate the potential security risks they introduce. At AWS re:Invent 2023, we presented on this topic, helping hundreds of customers maintain high-velocity decision-making for adopting new technologies securely. Customers who attended this session were able to better understand our recommended approach for
- Secure by Design: AWS enhances centralized security controls as MFA requirements expandby Arynn Crow on November 15, 2024 at 5:58 pm
At Amazon Web Services (AWS), we’ve built our services with secure by design principles from day one, including features that set a high bar for our customers’ default security posture. Strong authentication is a foundational component in overall account security, and the use of multi-factor authentication (MFA) is one of the simplest and most effective
- Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWSby Abdul Javid on November 15, 2024 at 2:55 pm
Our mission at AWS Security Assurance Services is to assist with Payment Card Industry Data Security Standard (PCI DSS) compliance for Amazon Web Services (AWS) customers. We work closely with AWS customers to answer their questions about compliance on the AWS Cloud, finding and implementing solutions, and optimizing their controls and assessments. We’ve compiled the
- Discover duplicate AWS Config rules for streamlined complianceby Aaron Klotnia on November 12, 2024 at 9:16 pm
Amazon Web Services (AWS) customers use various AWS services to migrate, build, and innovate in the AWS Cloud. To align with compliance requirements, customers need to monitor, evaluate, and detect changes made to AWS resources. AWS Config continuously audits, assesses, and evaluates the configurations of your AWS resources. AWS Config rules continuously evaluate your AWS
- Maximize your cloud security experience at AWS re:Invent 2024: A comprehensive guide to security sessionsby Apurva More on November 11, 2024 at 2:00 pm
AWS re:Invent 2024, which takes place December 2–6 in Las Vegas, will be packed with invaluable sessions for security professionals, cloud architects, and compliance leaders who are eager to learn about the latest security innovations. This year’s event puts best practices for zero trust, generative AI–driven security, identity and access management (IAM), DevSecOps, network and
- Amazon Inspector suppression rules best practices for AWS Organizationsby Mojgan Toth on November 5, 2024 at 7:57 pm
Vulnerability management is a vital part of network, application, and infrastructure security, and its goal is to protect an organization from inadvertent access and exposure of sensitive data and infrastructure. As part of vulnerability management, organizations typically perform a risk assessment to determine which vulnerabilities pose the greatest risk, evaluate their impact on business goals
- Implement effective data authorization mechanisms to secure your data used in generative AI applicationsby Riggs Goodman III on November 5, 2024 at 4:23 pm
Data security and data authorization, as distinct from user authorization, is a critical component of business workload architectures. Its importance has grown with the evolution of artificial intelligence (AI) technology, with generative AI introducing new opportunities to use internal data sources with large language models (LLMs) and multimodal foundation models (FMs) to augment model outputs.
- Unauthorized tactic spotlight: Initial access through a third-party identity providerby Steve de Vera on November 4, 2024 at 2:00 pm
Security is a shared responsibility between Amazon Web Services (AWS) and you, the customer. As a customer, the services you choose, how you connect them, and how you run your solutions can impact your security posture. To help customers fulfill their responsibilities and find the right balance for their business, under the shared responsibility model,
- New AWS Secure Builder training available through SANS Instituteby Mecca Nnacheta on October 31, 2024 at 11:01 pm
Education is critical to effective security. As organizations migrate, modernize, and build with Amazon Web Services (AWS), engineering and development teams need specific skills and knowledge to embed security into workloads. Lack of support for these skills can increase the likelihood of security incidents. AWS has partnered with SANS Institute to create SEC480: AWS Secure Builder—a
- Adding threat detection to custom authentication flow with Amazon Cognito advanced security featuresby Vishal Jakharia on October 28, 2024 at 10:06 pm
Recently, passwordless authentication has gained popularity compared to traditional password-based authentication methods. Application owners can add user management to their applications while offloading most of the security heavy-lifting to Amazon Cognito. You can use Amazon Cognito to customize user authentication flow by implementing passwordless authentication. Amazon Cognito enhances the security posture of your applications because
- Spring 2024 PCI DSS and 3DS compliance packages available nowby Ramone Weyerhaeuser on October 28, 2024 at 8:45 pm
Amazon Web Services (AWS) is pleased to announce that three new AWS services have been added to the scope of our Payment Card Industry Data Security Standard (PCI DSS) and Payment Card Industry Three Domain Secure (PCI 3DS) certifications: Amazon DataZone Amazon DevOps Guru Amazon Managed Grafana You can see the full list of services
- How to implement trusted identity propagation for applications protected by Amazon Cognitoby Joseph de Clerck on October 28, 2024 at 5:43 pm
Amazon Web Services (AWS) recently released AWS IAM Identity Center trusted identity propagation to create identity-enhanced IAM role sessions when requesting access to AWS services as well as to trusted token issuers. These two features can help customers build custom applications on top of AWS, which requires fine-grained access to data analytics-focused AWS services such
- How to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rulesby Javier Sanchez Navarro on October 25, 2024 at 8:25 pm
If you are new to AWS WAF and are interested in learning how to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rules, here is a basic, cost-effective way of using this action to help you reduce the impact of bot traffic in your applications. We also cover the basics of
- Amazon identified internet domains abused by APT29by CJ Moses on October 24, 2024 at 4:49 pm
APT29 aka Midnight Blizzard recently attempted to phish thousands of people. Building on work by CERT-UA, Amazon recently identified internet domains abused by APT29, a group widely attributed to Russia’s Foreign Intelligence Service (SVR). In this instance, their targets were associated with government agencies, enterprises, and militaries, and the phishing campaign was apparently aimed at
- Exploring digital sovereignty: learning opportunities at re:Invent 2024by Marta Taggart on October 24, 2024 at 1:41 pm
AWS re:Invent 2024, a learning conference hosted by Amazon Web Services (AWS) for the global cloud computing community, will take place December 2–6, 2024, in Las Vegas, Nevada, across multiple venues. At re:Invent, you can join cloud enthusiasts from around the world to hear the latest cloud industry innovations, meet with AWS experts, and build
- How to use the Amazon Detective API to investigate GuardDuty security findings and enrich data in Security Hubby Nicholas Jaeger on October 22, 2024 at 8:38 pm
Understanding risk and identifying the root cause of an issue in a timely manner is critical to businesses. Amazon Web Services (AWS) offers multiple security services that you can use together to perform more timely investigations and improve the mean time to remediate issues. In this blog post, you will learn how to integrate Amazon
- How to use interface VPC endpoints to meet your security objectivesby Joaquin Manuel Rinaudo on October 22, 2024 at 1:02 pm
October 28, 2024: We updated the text and figure for security objective 1 to show Amazon Route 53 Resolver DNS Firewall. Amazon Virtual Private Cloud (Amazon VPC) endpoints—powered by AWS PrivateLink—enable customers to establish private connectivity to supported AWS services, enterprise services, and third-party services by using private IP addresses. There are three types of