AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.
- How to restrict Amazon S3 bucket access to a specific IAM roleby Chris Craig on February 14, 2025 at 9:18 pm
February 14, 2025: This post was updated with the recommendation to restrict S3 bucket access to an IAM role by using the aws:PrincipalArn condition key instead of the aws:userid condition key. April 2, 2021: In the section “Granting cross-account bucket access to a specific IAM role,” we updated the second policy to fix an error.
- Introducing the AWS Trust Centerby Chris Betz on February 14, 2025 at 5:47 pm
We’re launching the AWS Trust Center, a new online resource that shares how we approach securing your assets in the cloud. The AWS Trust Center is a window into our security practices, compliance programs, and data protection controls that demonstrates how we work to earn your trust every day.
- The importance of encryption and how AWS can helpby Ken Beer on February 12, 2025 at 7:18 pm
February 12, 2025: This post was republished to include new services and features that have launched since the original publication date of June 11, 2020. Encryption is a critical component of a defense-in-depth security strategy that uses multiple defensive mechanisms to protect workloads, data, and assets. As organizations look to innovate while building trust with
- Implementing least privilege access for Amazon Bedrockby Jonathan Jenkyn on February 11, 2025 at 6:11 pm
Generative AI applications often involve a combination of various services and features—such as Amazon Bedrock and large language models (LLMs)—to generate content and to access potentially confidential data. This combination requires strong identity and access management controls and is special in the sense that those controls need to be applied on various levels. In this
- Announcing ASCP integration with Pod Identity: Enhanced security for secrets management in Amazon EKSby Rodrigo Bersa on February 10, 2025 at 8:32 pm
In 2021, Amazon Web Services (AWS) introduced the AWS Secrets and Configuration Provider (ASCP) for the Kubernetes Secrets Store Container Storage Interface (CSI) Driver, offering a reliable way to manage secrets in Amazon Elastic Kubernetes Service (Amazon EKS). Today, we’re excited to announce the integration of ASCP with Pod Identity, the new standard for AWS
- Enhancing telecom security with AWSby Kal Krishnan on February 7, 2025 at 6:04 pm
If you’d like to skip directly to the detailed mapping between the CISA guidance and AWS security controls and best practices, visit our Github page. Implementing CISA’s enhanced visibility and hardening guidance for communications infrastructure In response to recent cybersecurity incidents attributed to actors from the People’s Republic of China, a number of cybersecurity agencies
- 2024 PiTuKri ISAE 3000 Type II attestation report available with 179 services in scopeby Tariro Dongo on February 6, 2025 at 11:09 pm
Amazon Web Services (AWS) is pleased to announce the issuance of the Criteria to Assess the Information Security of Cloud Services (PiTuKri) Type II attestation report with 179 services in scope. The Finnish Transport and Communications Agency (Traficom) Cyber Security Centre published PiTuKri, which consists of 52 criteria that provide guidance across 11 domains for
- 2024 FINMA ISAE 3000 Type II attestation report available with 179 services in scopeby Tariro Dongo on February 6, 2025 at 11:07 pm
Amazon Web Services (AWS) is pleased to announce the issuance of the Swiss Financial Market Supervisory Authority (FINMA) Type II attestation report with 179 services in scope. The Swiss Financial Market Supervisory Authority (FINMA) has published several requirements and guidelines about engaging with outsourced services for the regulated financial services customers in Switzerland. An independent
- AWS renews MTCS Level 3 certification under the SS584:2020 standardby Joseph Goh on February 5, 2025 at 9:30 pm
Amazon Web Services (AWS) is pleased to announce the renewal of the Multi-Tier Cloud Security (MTCS) Level 3 certification under the SS584:2020 standard in December 2024 for the Asia Pacific (Singapore), Asia Pacific (Seoul), and United States AWS Regions, excluding AWS GovCloud (US) Regions. This achievement reaffirms our commitment to maintaining the highest security standards for our global
- How AWS Network Firewall session state replication maximizes high availability for your application trafficby Tushar Jagdale on February 5, 2025 at 5:01 pm
AWS Network Firewall is a managed, stateful network firewall and intrusion protection service that you can use to implement firewall rules for fine grained control over your network traffic. With Network Firewall, you can filter traffic at the perimeter of your virtual private cloud (VPC); including filtering traffic going to and coming from an internet
- Implement effective data authorization mechanisms to secure your data used in generative AI applications – part 2by Riggs Goodman III on February 3, 2025 at 5:03 pm
In part 1 of this blog series, we walked through the risks associated with using sensitive data as part of your generative AI application. This overview provided a baseline of the challenges of using sensitive data with a non-deterministic large language model (LLM) and how to mitigate these challenges with Amazon Bedrock Agents. The next
- Amazon Redshift enhances security by changing default behavior in 2025by Yanzhu Ji on January 30, 2025 at 6:19 pm
Today, I’m thrilled to announce that Amazon Redshift, a widely used, fully managed, petabyte-scale data warehouse, is taking a significant step forward in strengthening the default security posture of our customers’ data warehouses. Some default security settings for newly created provisioned clusters, Amazon Redshift Serverless workgroups, and clusters restored from snapshots have changed. These changes
- How to deploy an Amazon OpenSearch cluster to ingest logs from Amazon Security Lakeby Kevin Low on January 30, 2025 at 4:17 pm
July 29, 2024: Original publication date of this post. The current version was updated to make the instructions clearer and compatible with OCSF 1.1. Customers often require multiple log sources across their AWS environment to empower their teams to respond and investigate security events. In part one of this two-part blog post, I show you
- Updated whitepaper available: Aligning to the NIST Cybersecurity Framework in the AWS Cloudby Luca Iannario on January 28, 2025 at 10:13 pm
Today, we released an updated version of the Aligning to the NIST Cybersecurity Framework (CSF) in the AWS Cloud whitepaper to reflect the significant changes introduced in the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 2.0, published in February 2024. This comprehensive update helps you understand how AWS services align with the
- Testing and evaluating GuardDuty detectionsby Marshall Jones on January 28, 2025 at 7:47 pm
Amazon GuardDuty is a threat detection service that continuously monitors, analyzes, and processes Amazon Web Services (AWS) data sources and logs in your AWS environment. GuardDuty uses threat intelligence feeds, such as lists of malicious IP addresses and domains, file hashes, and machine learning (ML) models to identify suspicious and potentially malicious activity in your
- AWS Firewall Manager retrofitting: Harmonizing central security with application team flexibilityby Ian Olson on January 28, 2025 at 5:00 pm
AWS Firewall Manager is a powerful tool that organizations can use to define common AWS WAF rules with centralized security policies. These policies specify which accounts and resources are in scope. Firewall Manager creates a web access control list (web ACL) that adheres to the organization’s policy requirements and associates it with the in-scope resources.
- Announcing upcoming changes to the AWS Security Token Service global endpointby Palak Arora on January 27, 2025 at 11:00 pm
AWS launched AWS Security Token Service (AWS STS) in August 2011 with a single global endpoint (https://sts.amazonaws.com), hosted in the US East (N. Virginia) AWS Region. To reduce dependency on a single Region, STS launched AWS STS Regional endpoints (https://sts.{Region_identifier}.{partition_domain}) in February 2015. These Regional endpoints allow you to use STS in the same Region
- Building a culture of security: AWS partners with the BBCby Carter Spriggs on January 27, 2025 at 7:55 pm
Cybersecurity isn’t just about technology—it’s about people. That’s why Amazon Web Services (AWS) partnered with the BBC to explore the human side of cybersecurity in our latest article, The Human Side of Cybersecurity: Building a Culture of Security, available on the BBC website. In the piece, we spotlight the AWS Security Guardians program and how
- 2024 C5 Type 2 attestation report available with 179 services in scopeby Tea Jioshvili on January 27, 2025 at 5:10 pm
Amazon Web Services (AWS) is pleased to announce a successful completion of the 2024 Cloud Computing Compliance Controls Catalogue (C5) attestation cycle with 179 services in scope. This alignment with C5 requirements demonstrates our ongoing commitment to adhere to the heightened expectations for cloud service providers. AWS customers in Germany and across Europe can run
- CCN releases guide for Spain’s ENS landing zones using Landing Zone Accelerator on AWSby Tomás Clemente Sánchez on January 23, 2025 at 5:14 pm
The Spanish National Cryptologic Center (CCN) has published a new STIC guide (CCN-STIC-887 Anexo A) that provides a comprehensive template and supporting artifacts for implementing landing zones that comply with Spain’s National Security Framework (ENS) Royal Decree 311/2022 using the Landing Zone Accelerator on AWS.