fbpx

December 12, 2023: We’ve updated this post to clarify that you can use both sts:audit_context and sts:identity_context can be used to create an identity-enhanced session. <hr> <p><a href=”https://aws.amazon.com/iam” target=”_blank” rel=”noopener”>AWS Identity and Access Management (IAM)</a> roles are a powerful way to manage permissions to resources in the <a href=”https://aws.amazon.com” target=”_blank” rel=”noopener”>Amazon Web Services (AWS)</a> Cloud. […]

Read more

Several independent software vendors (ISVs) and software as a service (SaaS) providers need to access their customers’ Amazon Web Services (AWS) accounts, especially if the SaaS product accesses data from customer environments. SaaS providers have adopted multiple variations of this third-party access scenario. In some cases, the providers ask the customer for an access key […]

Read more

As organizations expand their Amazon Web Services (AWS) environment and migrate workloads to the cloud, they find themselves dealing with many AWS Identity and Access Management (IAM) roles and policies. These roles and policies multiply because IAM fills a crucial role in securing and controlling access to AWS resources. Imagine you have a team creating […]

Read more

{ AWS Security Hub is a sky safety { pose | tone} management service that enables automated { restoration | cleanup | remedy | redress}, aggregates protection findings from third-party security services and Amazon Web Services. | AWS Security Hub is a cloud security posture management service that enables automated remediation, aggregates security data from […]

Read more

With Amazon Relational Database Service (Amazon RDS), you can set up, operate, and scale a relational database in the AWS Cloud. Amazon RDS provides cost-efficient, resizable capacity for an industry-standard relational database and manages common database administration tasks. <p>If you use Amazon RDS for your workloads, you can now use <a href=”https://aws.amazon.com/guardduty/” target=”_blank” rel=”noopener”>Amazon GuardDuty</a> […]

Read more

August 13, 2018: Date this post was first published, on the Front-End Web and Mobile Blog. We updated the CloudFormation template, provided additional clarification on implementation steps, and revised to account for the new Amazon Cognito UI. <hr> <p>User authentication and authorization can be challenging when you’re building web and mobile apps. The challenges include […]

Read more

In this post, we’ll share an automation pattern that you can use to automatically detect and block suspicious hosts that are attempting to access your Amazon Web Services (AWS) resources. The automation will rely on Amazon GuardDuty to generate findings about the suspicious hosts, and then you can respond to those findings by programmatically updating […]

Read more

In this forum posting, we’ll demonstrate how to use managed to lists to make managing your AWS Network Firewall rules and policies across your Amazon Virtual Private Cloud( Amazon VPC ) in the same Amazon Region easier. <p>AWS Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention service for your Amazon […]

Read more