<p>Thank you to everyone who participated in <a href="https://reinforce.awsevents.com/" target="_blank" rel="noopener">AWS re:Inforce</a> 2023, both virtually and in-person. The conference featured a lineup of over 250 engaging sessions and hands-on labs, in collaboration with more than 80 AWS partner sponsors, over two days of immersive cloud security learning. The <a href="https://reinforce.awsevents.com/on-demand/" target="_blank" rel="noopener">keynote</a> was delivered by CJ Moses, AWS Chief Information Security Officer, Becky Weiss, AWS Senior Principal Engineer, and Debbie Wheeler, Delta Air Lines Chief Information Security Officer. They shared the latest innovations in cloud security from AWS and provided insights on how to foster a culture of security in your organization.</p>
<p>If you couldn’t join us or would like to revisit the insightful themes discussed, we’ve put together this blog post for you. It provides a comprehensive summary of all the key announcements made and includes information on where you can watch the keynote and sessions at your convenience.</p>
<h2>Key announcements</h2>
<p>Here are some of the top announcements that we made at AWS re:Inforce 2023:</p>
<ul>
<li><strong><a href="https://aws.amazon.com/verified-permissions/" target="_blank" rel="noopener">Amazon Verified Permissions</a> — </strong>Verified Permissions is a scalable permissions management and fine-grained authorization service for the applications you build. The service helps your developers build secure applications faster by externalizing authorization and centralizing policy management and administration. Developers can align their application access with <a href="https://aws.amazon.com/security/zero-trust/" target="_blank" rel="noopener">Zero Trust principles</a> by implementing least privilege and continual verification within applications. Security and audit teams can better analyze and audit who has access to what within applications. Amazon Verified Permissions uses <a href="https://www.cedarpolicy.com/en" target="_blank" rel="noopener">Cedar</a>, an open-source policy language for access control that empowers developers and admins to define policy-based access controls using roles and attributes for context-aware access control.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/amazon-inspector-code-scans-aws-lambda-function/" target="_blank" rel="noopener">Amazon Inspector code scanning of Lambda functions</a> —</strong> <a href="https://aws.amazon.com/inspector/" target="_blank" rel="noopener">Amazon Inspector</a> now supports code scanning of <a href="https://aws.amazon.com/lambda/" target="_blank" rel="noopener">AWS Lambda</a> functions, expanding the existing capability to scan Lambda functions and associated layers for software vulnerabilities in application package dependencies. Amazon Inspector code scanning of Lambda functions scans custom proprietary application code you write within Lambda functions for security vulnerabilities such as injection flaws, data leaks, weak cryptography, or missing encryption. Upon detecting code vulnerabilities within the Lambda function or layer, Amazon Inspector generates actionable security findings that provide several details, such as security detector name, impacted code snippets, and remediation suggestions to address vulnerabilities. The findings are aggregated in the Amazon Inspector console and integrated with <a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener">AWS Security Hub</a> and <a href="https://aws.amazon.com/eventbridge/" target="_blank" rel="noopener">Amazon EventBridge</a> for streamlined workflow automation.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/software-bill-materials-export-capability-amazon-inspector/" target="_blank" rel="noopener">Amazon Inspector SBOM export</a> —</strong> Amazon Inspector now offers the ability to export a consolidated Software Bill of Materials (SBOMs) for resources that it monitors across your organization in multiple industry-standard formats, including CycloneDx and Software Package Data Exchange (SPDX). With this new capability, you can use automated and centrally managed SBOMs to gain visibility into key information about your software supply chain. This includes details about software packages used in the resource, along with associated vulnerabilities. SBOMs can be exported to an <a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener">Amazon Simple Storage Service (Amazon S3)</a> bucket and downloaded for analyzing with <a href="https://aws.amazon.com/athena/" target="_blank" rel="noopener">Amazon Athena</a> or <a href="https://aws.amazon.com/quicksight/" target="_blank" rel="noopener">Amazon QuickSight</a> to visualize software supply chain trends. This functionality is available with a few clicks in the Amazon Inspector console or using Amazon Inspector APIs.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/amazon-codeguru-security-available-preview/" target="_blank" rel="noopener">Amazon CodeGuru Security</a> —</strong> <a href="https://aws.amazon.com/codeguru/" target="_blank" rel="noopener">Amazon CodeGuru Security</a> offers a comprehensive set of APIs that are designed to seamlessly integrate with your existing pipelines and tooling. CodeGuru Security serves as a static application security testing (SAST) tool that uses machine learning to help you identify code vulnerabilities and provide guidance you can use as part of remediation. CodeGuru Security also provides in-context code patches for certain classes of vulnerabilities, helping you reduce the effort required to fix code.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/amazon-ec2-instance-connect-ssh-rdp-public-ip-address/" target="_blank" rel="noopener">Amazon EC2 Instance Connect Endpoint</a> — </strong><a href="https://aws.amazon.com/ec2/" target="_blank" rel="noopener">Amazon Elastic Compute Cloud (Amazon EC2)</a> announced support for connectivity to instances using SSH or RDP in private subnets over the Amazon EC2 Instance Connect Endpoint (EIC Endpoint). With this capability, you can connect to your instances by using SSH or RDP from the internet without requiring a public IPv4 address.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/aws-built-in-partner-software-automates/" target="_blank" rel="noopener">AWS built-in partner solutions</a> —</strong> <a href="https://aws.amazon.com/built-in/" target="_blank" rel="noopener">AWS built-in</a> partner solutions are co-built with AWS experts, helping to ensure that AWS Well-Architected security reference architecture guidelines and best security practices were rigorously followed. AWS built-in partner solutions can save you valuable time and resources by getting the building blocks of cloud development right when you begin a migration or modernization initiative. AWS built-in solutions also automate deployments and can reduce installation time from months or weeks to a single day. Customers often look to our partners for innovation and help with “getting cloud right.” Now, partners with AWS built-in solutions can help you be more efficient and drive business value for both partner software and AWS native services.</li>
<li><strong><a href="https://aws.amazon.com/cyber-insurance/" target="_blank" rel="noopener">AWS Cyber Insurance Partners</a> —</strong> AWS has worked with leading cyber insurance partners to help simplify the process of obtaining cyber insurance. You can now reduce business risk by finding and procuring cyber insurance directly from validated AWS cyber insurance partners. To reduce the amount of paperwork and save time, download and share your <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/fsbp-standard.html" target="_blank" rel="noopener">AWS Foundational Security Best Practices Standard</a> detailed report from <a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener">AWS Security Hub</a> and share the report with the AWS Cyber Insurance Partner of your choice. With AWS vetted cyber insurance partners, you can have confidence that these insurers understand AWS security posture and are evaluating your environment according to the latest AWS Security Best Practices. Now you can get a full cyber insurance quote in just two business days.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/aws-global-partner-security-initiative/" target="_blank" rel="noopener">AWS Global Partner Security Initiative</a> —</strong> With the AWS Global Partner Security Initiative, AWS will jointly develop end-to-end security solutions and managed services, leveraging the capabilities, scale, and deep security knowledge of our Global System Integrators (GSI) partners.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/amazon-detective-finding-groups-amazon-inspector/" target="_blank" rel="noopener">Amazon Detective finding groups</a> —</strong> <a href="https://aws.amazon.com/detective/" target="_blank" rel="noopener">Amazon Detective</a> expands its finding groups capability to include Amazon Inspector findings, in addition to <a href="https://aws.amazon.com/guardduty/" target="_blank" rel="noopener">Amazon GuardDuty</a> findings. Using machine learning, this extension of the finding groups feature significantly streamlines the investigation process, reducing the time spent and helping to improve identification of the root cause of security incidents. By grouping findings from Amazon Inspector and GuardDuty, you can use Detective to answer difficult questions such as “was this EC2 instance compromised because of a vulnerability?” or “did this GuardDuty finding occur because of unintended network exposure?” Furthermore, Detective maps the identified findings and their corresponding tactics, techniques, and procedures to the MITRE ATT&CK framework, enhancing the overall effectiveness and alignment of security measures.</li>
<li><strong>[Pre-announce] AWS Private Certificate Authority Connector for Active Directory –—</strong> <a href="https://aws.amazon.com/private-ca/" target="_blank" rel="noopener">AWS Private CA</a> will soon launch a Connector for Active Directory (AD). The Connector for AD will help to reduce upfront public key infrastructure (PKI) investment and ongoing maintenance costs with a fully managed serverless solution. This new feature will help reduce PKI complexity by replacing on-premises certificate authorities with a highly secure hardware security module (HSM)-backed AWS Private CA. You will be able to automatically deploy certificates using auto-enrollment to on-premises AD and <a href="https://aws.amazon.com/directoryservice/" target="_blank" rel="noopener">AWS Directory Service</a> for Microsoft Active Directory.</li>
<li><strong><a href="https://aws.amazon.com/blogs/aws/new-move-payment-processing-to-the-cloud-with-aws-payment-cryptography/" target="_blank" rel="noopener">AWS Payment Cryptography</a> —</strong> The day before re:Inforce, <a href="https://aws.amazon.com/payment-cryptography/" target="_blank" rel="noopener">AWS Payment Cryptography</a> launched with general availability. This service simplifies cryptography operations in cloud-hosted payment applications. AWS Payment Cryptography simplifies your implementation of the cryptographic functions and key management used to secure data and operations in payment processing in accordance with various PCI standards.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/aws-waf-fraud-control-account-creation-prevention-pricing/" target="_blank" rel="noopener">AWS WAF Fraud Control launches account creation fraud prevention</a> —</strong> AWS WAF Fraud Control announces <a href="https://aws.amazon.com/waf/features/fraud-control/" target="_blank" rel="noopener">Account Creation Fraud Prevention</a>, a managed protection for AWS WAF that’s designed to prevent creation of fake or fraudulent accounts. Fraudsters use fake accounts to initiate activities, such as abusing promotional and sign-up bonuses, impersonating legitimate users, and carrying out phishing tactics. Account Creation Fraud Prevention helps protect your account sign-up or registration pages by allowing you to continuously monitor requests for anomalous digital activity and automatically block suspicious requests based on request identifiers and behavioral analysis.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/aws-security-hub-automation-rules/" target="_blank" rel="noopener">AWS Security Hub automation rules</a> —</strong> <a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener">AWS Security Hub</a>, a cloud security posture management service that performs security best practice checks, aggregates alerts, and facilitates automated remediation, now features a capability to automatically update or suppress findings in near real time. You can now use automation rules to automatically update various fields in findings, suppress findings, update finding severity and workflow status, add notes, and more.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/amazon-s3-dual-layer-encryption-compliance-workloads/" target="_blank" rel="noopener">Amazon S3 announces dual-layer server-side encryption</a> —</strong> Amazon S3 is the only cloud object storage service where you can apply two layers of encryption at the object level and control the data keys used for both layers. Dual-layer server-side encryption with keys stored in<a href="https://aws.amazon.com/kms/" target="_blank" rel="noopener"> AWS Key Management Service</a> (DSSE-KMS) is designed to adhere to National Security Agency Committee on National Security Systems Policy (CNSSP) 15 for FIPS compliance and Data-at-Rest Capability Package (DAR CP) Version 5.0 guidance for two layers of MFS U/00/814670-15 Commercial National Security Algorithm (CNSA) encryption.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/aws-cloudtrail-lake-curated-dashboards-visualizing-trends/" target="_blank" rel="noopener">AWS CloudTrail Lake dashboards</a> —</strong> AWS CloudTrail Lake, a managed data lake that lets organizations aggregate, immutably store, visualize, and query their audit and security logs, announces the general availability of CloudTrail Lake dashboards. CloudTrail Lake dashboards provide out-of-the-box visualizations and graphs of key trends from your audit and security data directly within the CloudTrail console. It also offers the flexibility to drill down on additional details, such as specific user activity, for further analysis and investigation using CloudTrail Lake SQL queries.</li>
<li><strong><a href="https://aws.amazon.com/about-aws/whats-new/2023/06/well-architected-introduces-profiles/" target="_blank" rel="noopener">AWS Well-Architected Profiles</a> —</strong> AWS Well-Architected introduces Profiles, which allows you to tailor your Well-Architected reviews based on your business goals. This feature creates a mechanism for continuous improvement by encouraging you to review your workloads with certain goals in mind first, and then complete the remaining Well-Architected review questions.</li>
</ul>
<h2>Watch on demand</h2>
<p><strong>Leadership sessions</strong> — You can watch the <a href="https://reinforce.awsevents.com/on-demand/" target="_blank" rel="noopener">leadership sessions </a>to learn from AWS security experts as they talk about essential topics, including open source software (OSS) security, Zero Trust, compliance, and proactive security.</p>
<p><strong>Breakout sessions, lightning talks, and more</strong> — Explore our content across these six tracks:</p>
<ul>
<li><a href="https://www.youtube.com/playlist?list=PL2yQDdvlhXf-0NaMHtVL3_VcpvmiCJG6-" target="_blank" rel="noopener">Application Security</a>— Discover how AWS, customers, and AWS Partners move fast while understanding the security of the software they build.</li>
<li><a href="https://www.youtube.com/playlist?list=PL2yQDdvlhXf8UV0OyBQGDpq9I8CsSCqKX" target="_blank" rel="noopener">Data Protection</a> — Learn how AWS, customers, and AWS Partners work together to protect data. Get insights into trends in data management, cryptography, data security, data privacy, encryption, and key rotation and storage.</li>
<li><a href="https://www.youtube.com/playlist?list=PL2yQDdvlhXf88swEJuVlB6w0mJAqw8thH" target="_blank" rel="noopener">Governance, Risk, and Compliance</a> — Dive into the latest hot topics in governance and compliance for security practitioners, and discover how to automate compliance tools and services for operational use.</li>
<li><a href="https://www.youtube.com/playlist?list=PL2yQDdvlhXf_yD57B0x7TZI3cpKu0uEa2" target="_blank" rel="noopener">Identity and Access Management</a> — Learn how AWS, customers, and AWS Partners use <a href="https://aws.amazon.com/identity/" target="_blank" rel="noopener">AWS Identity Services</a> to manage identities, resources, and permissions securely and at scale. Discover how to configure fine-grained access controls for your employees, applications, and devices and deploy permission guardrails across your organization.</li>
<li><a href="https://www.youtube.com/playlist?list=PL2yQDdvlhXf-MKtYve4wwZ4suV4yHl1y-" target="_blank" rel="noopener">Network and Infrastructure Security</a> — Gain practical expertise on the services, tools, and products that AWS, customers, and partners use to protect the usability and integrity of their networks and data.</li>
<li><a href="https://aws.amazon.com/blogs/security/three-ways-to-accelerate-incident-response-in-the-cloud-insights-from-reinforce-2023/" target="_blank" rel="noopener">Threat Detection and Incident Response</a> — Discover how AWS, customers, and AWS Partners get the visibility they need to improve their security posture, reduce the risk profile of their environments, identify issues before they impact business, and implement incident response best practices.</li>
<li>You can also watch our <a href="https://www.youtube.com/playlist?list=PL2yQDdvlhXf-nusAQekNll3ah3Yfog5BC" target="_blank" rel="noopener">Lightning Talks</a> and the AWS On Air <a href="https://www.twitch.tv/videos/1846123347" target="_blank" rel="noopener">day 1</a> and <a href="https://www.twitch.tv/awsonair/video/1845341673" target="_blank" rel="noopener">day 2</a> livestream on demand.</li>
</ul>
<p>Session presentation downloads are also available on the <a href="https://aws.amazon.com/events/events-content/?awsf.filter-series=event-series%23reinforce&awsf.filter-session-type=*all&awsf.filter-level=*all&awsf.filter-topic=event-topic%23security-compliance&awsf.filter-industry=*all&awsf.filter-language=language%23english&awsm.page-cards=1" target="_blank" rel="noopener">AWS Events Content</a> page. If you’re interested in further in-person security learning opportunities, consider registering for <a href="https://reinvent.awsevents.com/" target="_blank" rel="noopener">AWS re:Invent 2023</a>, which will be held from November 27 to December 1 in Las Vegas, NV. We look forward to seeing you there!</p>
<p>If you would like to discuss how these new announcements can help your organization improve its security posture, AWS is here to help. <a href="https://aws.amazon.com/contact-us/sales-support/" target="_blank" rel="noopener">Contact</a> your AWS account team today.</p>
<p>If you have feedback about this post, submit comments in the Comments section below. If you have questions about this post, <a href="https://console.aws.amazon.com/support/home" target="_blank" rel="noopener">contact AWS Support</a>.</p>
<!-- '"` -->
Like this:
Like Loading...
You must be logged in to post a comment.