Tag: AWS
-
How to build a CA hierarchy across multiple AWS accounts and Regions for global organization
Building a certificate authority (CA) hierarchy using AWS Private Certificate Authority has been made simple in Amazon Web Services (AWS); …
-
How to use the AWS Secrets Manager Agent
AWS Secrets Manager Agent AWS Secrets Manager is a service that helps you manage, retrieve, and rotate database credentials, application …
-
AWS Cost Allocation Tags: Your Secret Weapon for Effective Cost Management
AWS cost allocation tags are metadata labels assigned to AWS resources that help in categorizing and tracking costs. These tags consist of …
-
Here’s how carefully concealed backdoor in fake AWS files escaped mainstream notice
Researchers have determined that two fake AWS packages downloaded hundreds of times from the open source NPM JavaScript repository …
-
Patterns for consuming custom log sources in Amazon Security Lake
AWS Security Blog Patterns for consuming custom log sources in Amazon Security Lake As security best practices have evolved over the years, …
-
AWS Summit New York 2024: Guardrails for Amazon Bedrock Gains Claude 3 Haiku and Contextual Grounding
Amazon was one of the tech giants that agreed to a set of White House recommendations regarding the use of generative AI last year. The …
-
Strategies for achieving least privilege at scale – Part 2
This mental model is known as the theory of constraints. With this model in mind, you should be keen to search for constraints, or …
-
Strategies for achieving least privilege at scale – Part 1
AWS Security Blog Strategies for achieving least privilege at scale – Part 1 Least privilege is an important security topic for Amazon …
-
Top four ways to improve your Security Hub security score
How to improve the security score? You can improve your security score in four …
-
Centrally manage VPC network ACL rules to block unwanted traffic using AWS Firewall Manager
Amazon Virtual Private Cloud (Amazon VPC) provides two options for controlling network traffic: network access control lists (ACLs) and …
-
LogRhythm boosts security with data intelligence, AWS integration and compliance updates
Security intelligence firm LogRhythm Inc. today announced enhancements to its security solutions. They include improvements to its …
-
Non-Production Endpoints as an Attack Surface in AWS
The security team at Datadog recently disclosed a security issue on AWS where non-production endpoints were used as an attack surface to …
●●●