AWS Security

AWS Security Blog The latest AWS security, identity, and compliance launches, announcements, and how-to posts.

  • How to create post-quantum signatures using AWS KMS and ML-DSA
    by Jake Massimo on June 13, 2025 at 6:11 pm

    As the capabilities of quantum computing evolve, AWS is committed to helping our customers stay ahead of emerging threats to public-key cryptography. Today, we’re announcing the integration of FIPS 204: Module-Lattice-Based Digital Signature Standard (ML-DSA) into AWS Key Management Service (AWS KMS). Customers can now create and use ML-DSA keys through the same familiar AWS

  • AI security strategies from Amazon and the CIA: Insights from AWS Summit Washington, DC
    by Danielle Ruderman on June 13, 2025 at 5:10 pm

    At this year’s AWS Summit in Washington, DC, I had the privilege of moderating a fireside chat with Steve Schmidt, Amazon’s Chief Security Officer, and Lakshmi Raman, the CIA’s Chief Artificial Intelligence Officer. Our discussion explored how AI is transforming cybersecurity, threat response, and innovation across the public and private sectors. The conversation highlighted several

  • AWS CIRT announces the launch of the Threat Technique Catalog for AWS
    by Steve de Vera on June 13, 2025 at 3:22 pm

    June 13, 2025: This post was updated to fix an incorrect link. Greetings from the AWS Customer Incident Response Team (AWS CIRT). AWS CIRT is a 24/7, specialized global Amazon Web Services (AWS) team that provides support to customers during active security events on the customer side of the AWS Shared Responsibility Model. We’re excited

  • Introducing the AWS Security Champion Knowledge Path and digital badge
    by Sarah Currey on June 12, 2025 at 5:27 pm

    Today, Amazon Web Service (AWS) introduces the Security Champion Knowledge Path on AWS Skill Builder, featuring training and a digital badge. The Security Champion Knowledge path is a comprehensive educational framework designed to empower developers and software engineers with essential AWS cloud security knowledge and best practices. The structured learning path enables development teams to

  • AWS completes Police-Assured Secure Facilities (PASF) audit in Europe (London) AWS Region
    by Vishal Pabari on June 11, 2025 at 3:53 pm

    We’re excited to announce that our Europe (London) AWS Region has renewed its accreditation for United Kingdom (UK) Police-Assured Secure Facilities (PASF) for Official-Sensitive data. Since 2017, the Amazon Web Services (AWS) Europe (London) Region has been accredited under the PASF program. This demonstrates our continuous commitment to adhere to the heightened expectations of customers

  • Building identity-first security: A guide to the Identity and Access Management track at AWS re:Inforce 2025
    by Rahul Sahni on June 10, 2025 at 9:59 pm

    Join us at AWS re:Inforce 2025 from June 16 to 18 as we dive deep into identity and access management, where we’ll explore how organizations are securing identities at scale. As the traditional security perimeter continues to dissolve in our hybrid and multi-cloud world, this year’s sessions showcase how AWS customers are building comprehensive identity-centric

  • Building secure foundations: A guide to network and infrastructure security at AWS re:Inforce 2025
    by Brandon Carroll on June 9, 2025 at 3:37 pm

    A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. Securing cloud infrastructure has never been more critical as organizations continue to expand their digital footprint and embrace modern architectures. At AWS re:Inforce 2025, the Network and Infrastructure Security track brings together security

  • 2025 ISO and CSA STAR certificates now available with three new Regions
    by Chinmaee Parulekar on June 6, 2025 at 8:06 pm

    Amazon Web Services (AWS) successfully completed an onboarding audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. EY CertifyPoint auditors conducted the audit and reissued the certificates on May 26, 2025. The objective of the audit was to assess

  • How to use on-demand rotation for AWS KMS imported keys
    by Jeremy Stieglitz on June 6, 2025 at 6:03 pm

    Today, we’re announcing support for on-demand rotation of symmetric encryption AWS Key Management Service (AWS KMS) keys with imported key material (EXTERNAL origin). This new capability enables you to rotate the cryptographic key material of these keys without changing the key identifier (key ID or Amazon Resource Name (ARN)). Rotating keys helps you meet compliance

  • Many voices, one community: Three themes from RSA Conference 2025
    by Anne Grahn on June 5, 2025 at 8:09 pm

    RSA Conference (RSAC) 2025 drew 730 speakers, 650 exhibitors, and 44,000 attendees from across the globe to the Moscone Center in San Francisco, California from April 28 through May 1. The keynote lineup was eclectic, with 37 presentations featuring speakers ranging from NBA Hall of Famer Earvin “Magic” Johnson to public and private-sector luminaries such as former

  • Implementing just-in-time privileged access to AWS with Microsoft Entra and AWS IAM Identity Center
    by Rodney Underkoffler on June 3, 2025 at 4:45 pm

    Controlling access to your privileged and sensitive resources is critical for all AWS customers. Preventing direct human interaction with services and systems through automation is the primary means of accomplishing this. For those infrequent times when automation is not yet possible or implemented, providing a secure method for temporary elevated access is the next best

  • A deep dive into data protection sessions at AWS re:Inforce 2025
    by Rahul Sahni on June 2, 2025 at 4:56 pm

    June 4, 2025: We removed a paragraph about advanced seat reservation because this option isn’t available this year. A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. At Amazon Web Services (AWS), security is our top priority. We’re excited to announce the

  • Application security at re:Inforce 2025
    by Daniel Begimher on May 28, 2025 at 10:06 pm

    A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. Join us in Philadelphia on June 16–18, 2025, for AWS re:Inforce, where you can enhance your skills and confidence in cloud security, compliance, identity, and privacy. As an attendee, you will have access to

  • Introducing new regional implementations of Landing Zone Accelerator on AWS to support digital sovereignty
    by Max Peterson on May 27, 2025 at 10:00 pm

    Customers often tell me that they want a simpler path to meet the compliance and industry regulatory mandates they have in their geographic regions. In our deep engagements with partners and customers, we have learned that one of the greatest challenges for customers is the translation of security and compliance requirements into distinct technical controls.

  • How to use the new AWS Secrets Manager Cost Allocation Tags feature
    by Jirka Fajfr on May 27, 2025 at 8:48 pm

    AWS Secrets Manager is a service that you can use to manage, retrieve, and rotate database credentials, application credentials, API keys, and other secrets throughout their lifecycles. You can use Secrets Manager to replace hard-coded credentials in application source code with a runtime call to the Secrets Manager service to retrieve credentials dynamically when you

  • Elevate your AI security: Must-see re:Inforce 2025 sessions
    by Margaret Jonson on May 27, 2025 at 7:47 pm

    A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. From proof of concepts to large scale production deployments, the rapid advancement of generative AI has ushered in unique opportunities for innovation, but it also introduces a new set of security challenges (and

  • Navigating the threat detection and incident response track at re:Inforce 2025
    by Nisha Amthul on May 27, 2025 at 4:20 pm

    A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. We’re counting down to AWS re:Inforce, our annual cloud security event! We are thrilled to invite security enthusiasts and builders to join us in Philadelphia, PA June 16–18, 2025, for an immersive three-day

  • How to automate incident response for Amazon EKS on Amazon EC2
    by Jonathan Nguyen on May 20, 2025 at 4:53 pm

    Triaging and quickly responding to security events is important to minimize impact within an AWS environment. Acting in a standardized manner is equally important when it comes to capturing forensic evidence and quarantining resources. By implementing automated solutions, you can respond to security events quickly and in a repeatable manner. Before implementing automated security solutions,

  • Introducing the AWS User Guide to Governance, Risk and Compliance for Responsible AI Adoption within Financial Services Industries
    by Krish De on May 14, 2025 at 11:52 pm

    Financial services institutions (FSIs) are increasingly adopting AI technologies to drive innovation and improve customer experiences. However, this adoption brings new governance, risk, and compliance (GRC) considerations that organizations need to address. To help FSI customers navigate these challenges, AWS is excited to announce the launch of the AWS User Guide to Governance, Risk and

  • Protect against advanced DNS threats with Amazon Route 53 Resolver DNS Firewall
    by Lawton Pittenger on May 13, 2025 at 10:45 pm

    Every day, millions of applications seamlessly connect users to the digital services they need through DNS queries. These queries act as an interface to the internet’s address book, translating familiar domain names like amazon.com into the IP addresses that computers use to appropriately route traffic. The DNS landscape presents unique security challenges and opportunities in

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.