New & Notable
AWS security News
April 01, 2020
AWS has released Amazon Detective, a managed threat hunting service that generates visualizations out of log data from native Amazon Web Services.
December 31, 2019
It's almost impossible to keep up with all the services and capabilities AWS trots out for its annual re:Invent conference. Catch up on Amazon cloud updates you missed with this AWS re:Invent recap.
August 05, 2019
Infosec pros warn of server-side request forgery vulnerabilities in AWS following the Capital One data breach, which may have revealed an issue regarding the AWS metadata service.
June 28, 2019
Robust data coupled with the power of metaphors can help cybersecurity teams tell stories that get the rest of the business on board with new security initiatives and prepare for security crises.
AWS security Get Started
Bring yourself up to speed with our introductory content
Traffic mirroring is a feature for Amazon Virtual Private Cloud (Amazon VPC). The feature is used to monitor the network-level traffic of workloads. Continue Reading
In this book excerpt from "AWS Certified SysOps Administrator Associate All-in-One Exam Guide," review the best practices for OS and application security on AWS. Continue Reading
Get started with this guide to AWS Config rules. Learn how to customize AWS Config managed rules with CloudFormation and create new rules with AWS Lambda. Continue Reading
Evaluate AWS security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Protect your AWS cloud environment with these Amazon firewall services. Learn how security groups and network ACLs work, along with other key AWS firewall options. Continue Reading
Explore what AWS' recent IT purchases say about the cloud vendor's overall acquisition strategy and why it likes to make the smaller deals instead of any big splash. Continue Reading
The WebSockets vs. HTTP debate has changed for AWS users. With WebSocket support for Amazon API Gateway, users can build serverless applications that can communicate instantaneously. Continue Reading
Manage AWS security
Learn to apply best practices and optimize your operations.
IT services firms have a responsibility to secure their clients' remote workforces. Here are four tips for maintaining cyber hygiene in the cloud, using AWS as an example. Continue Reading
To best secure network access, AWS administrators need to create rules for network resources. Learn how to implement Amazon VPC security best practices in this book excerpt. Continue Reading
Securing network access in AWS requires the right rules to be in place. Learn more about Virtual Private Clouds and how implementing them can prevent common cloud security attacks. Continue Reading
Problem Solve AWS security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attention AWS pen testers: The trick to understanding the indicators of AWS S3 bucket vulnerabilities is setting up an insecure bucket. Learn how in this actionable guide. Continue Reading
Security researcher Benjamin Caudill shares details from his book, 'Hands-On AWS Penetration Testing with Kali Linux,' and advice on Amazon S3 bucket pen testing for ethical hackers. Continue Reading
AWS has flooded its catalog with services, but enterprises still struggle with the gaps that remain. Find out which pain points cloud experts want AWS to address at re:Invent this year. Continue Reading