AWS security News
March 03, 2015
Hackers attacked a helpdesk software maker's website, putting tens of thousands of customers at risk. But a move to Amazon Web Services saved the day.
February 16, 2015
Amazon Web Services IAM now supports managed policies, which allows IT teams to cut back on manual processes.
February 05, 2015
IBM and AWS both offer solid cloud security services, but true security is in the user's hands, with many third-party products to choose from.
December 04, 2014
Microsoft is working to improve Azure security, but analysts say Amazon Web Services is still in the lead when it comes to cloud security capabilities.
AWS security Get Started
Bring yourself up to speed with our introductory content
Research shows that more companies are adopting DevOps, or the blending of an organization’s application development and systems operations teams. Cloud DevOps is a natural fit for many organizations because it enables faster development and ... Continue Reading
AWS Multi-Factor Authentication (MFA) is the practice or requiring two or more forms of authentication to protect AWS resources. Continue Reading
Creating a strong password policy in AWS is one step to protect data. If managed properly, multi-factor authentication adds another layer of protection. Continue Reading
Evaluate AWS security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
CloudTrail, CloudWatch and AWS Config are three different tools from Amazon that help enterprises monitor AWS. Expert Dan Sullivan explains the differences between the three and when each should be used. Continue Reading
Many IT teams believe security belongs to someone else. Building security into the DevOps process can be a tricky but rewarding move. Continue Reading
The AWS Key Management Service is a good tool for cloud encryption key management. Expert Dave Shackleford examines AWS KMS and its benefits to enterprises. Continue Reading
Product ReviewsPowered by IT Central Station
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.Powered by IT Central Station
The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private...Continue Reading
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage AWS security
Learn to apply best practices and optimize your operations.
Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading
AWS considers security a shared responsibility, so admins must take all steps necessary to ensure data that resides in RDS is safe. Continue Reading
Developers put security second in the software development process. SecOps rolls the continuous threat testing and monitoring makes it a priority. Continue Reading
Problem Solve AWS security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Automating configuration and change management with OpsWorks can help admins ensure consistency and security for cloud-based apps. Continue Reading
Many public cloud providers offer tools to test security, but they can't do it all. Penetration testing can help detect cloud app security gaps. Continue Reading
Dan Sullivan reviews best practices for AWS disaster recovery to help users identify and plan for unexpected problems related to a disaster. Continue Reading