aws
How to build a CI/CD pipeline for container vulnerability scanning with Tri
https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]
Added 1 month ago
IAM Best Practices - AWS Identity and Access Management
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsiambestpractices&sc_category=AWS_Identity_and_Access_Management&linkId=46957150
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
Added 1 month ago
https://github.com/awslabs/aws-cloudsaga
https://github.com/awslabs/aws-cloudsaga
AWS CloudSaga - Simulate security events in AWS. Contribute to awslabs/aws-cloudsaga development by creating an account on GitHub.
Added 1 month ago
Watch "Deep Dive on Inventory Management and Configuration Compliance in AW
https://youtu.be/_lnp6IN_W6Q
Tracking configuration changes to your cloud resources can be challenging, especially when resources are dynamic in the cloud and change quickly and frequent...
Added 1 month ago
https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_cloudhsm&linkId=50579720
https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_cloudhsm&linkId=50579720
Feb 17, 2025: This blog post references AWS CloudHSM Client SDK 3, which is no longer the recommended version. AWS recommends that you use the latest version, AWS CloudHSM Client SDK 5, which provides updated functionality and commands. We are currently working on an updated blog post for CloudHSM Client SDK 5. See the AWS […]
Added 1 month ago
https://aws.amazon.com/blogs/security/introducing-aws-single-sign-on/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awssso&sc_category=AWS_Identity_and_Access_Management&linkId=46975058
https://aws.amazon.com/blogs/security/introducing-aws-single-sign-on/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awssso&sc_category=AWS_Identity_and_Access_Management&linkId=46975058
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS introduced AWS IAM Identity Center (AWS IAM Identity Center), a service that makes it easy for you to centrally manage IAM Identity […]
Added 1 month ago
Learn AWS Pentesting
https://www.youtube.com/playlist?list=PLMoaZm9nyKaNRN0SoR_PBVYc_RAhbZdG4
Share your videos with friends, family and the world
Added 1 month ago
https://aws.amazon.com/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_delegate_permission&linkId=54227051
https://aws.amazon.com/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_delegate_permission&linkId=54227051
Today, AWS released a new IAM feature that makes it easier for you to delegate permissions management to trusted employees. As your organization grows, you might want to allow trusted employees to configure and manage IAM permissions to help your organization scale permission management and move workloads to AWS faster. For example, you might want […]
Added 1 month ago
AWS Launches EKS Dashboard to Tackle Multi-Cloud Kubernetes Complexity - InfoQ
https://www.infoq.com/news/2025/06/aws-eks-dashboard-kubernetes/
Introducing the Amazon EKS Dashboard: a centralized management tool delivering unified visibility across multiple Kubernetes clusters in AWS. Simplifying operational oversight, it offers insights on r
Added 1 month ago
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
Use roles to grant an IAM user access through identity federation (authorization by an external service).
Added 1 month ago
https://dzone.com/articles/3-steps-to-becoming-an-aws-security-specialist
https://dzone.com/articles/3-steps-to-becoming-an-aws-security-specialist
Added 1 month ago
Mountpoint for Amazon S3 now lets you automatically mount your S3 buckets using fstab - AWS
https://aws.amazon.com/about-aws/whats-new/2025/05/mountpoint-amazon-s3-mount-buckets-fstab/
Discover more about what's new at AWS with Mountpoint for Amazon S3 now lets you automatically mount your S3 buckets using fstab
Added 1 month ago
Watch "Build Enterprise-Grade Serverless Apps - AWS Online Tech Talks" on Y
https://youtu.be/l9Lw8y5P5ok
To learn more, please visit: In this session, we explore how developers can design, develop, deliver, and monitor cloud applications as they take advantage o...
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_centralize_automate_IAM&linkId=62045363
https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_centralize_automate_IAM&linkId=62045363
To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]
Added 1 month ago
https://aws.amazon.com/blogs/security/create-fine-grained-session-permissions-using-iam-managed-policies/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_fine_grained_IAM_TWITTER&sc_content=security_blog_fine_grained_IAM&linkId=67337463
https://aws.amazon.com/blogs/security/create-fine-grained-session-permissions-using-iam-managed-policies/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_fine_grained_IAM_TWITTER&sc_content=security_blog_fine_grained_IAM&linkId=67337463
As a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=82078481
https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=82078481
August 31, 2021:AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. Typically, when you protect data in Amazon Simple Storage Service (Amazon S3), you use a combination […]
Added 1 month ago
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/
Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]
Added 1 month ago
Federate Kubernetes with AWS IAM using OIDC · reecetech
https://reece.tech/posts/oidc-k8s-to-aws/
Added 1 month ago
https://kkc.github.io/2018/03/14/AWS-VPN-with-RouterBoard/
https://kkc.github.io/2018/03/14/AWS-VPN-with-RouterBoard/
Notes about technology, DevOps, programming, and database
Added 1 month ago
AWS Federated Authentication with Active Directory Federation Services (AD
https://aws.amazon.com/blogs/security/aws-federated-authentication-with-active-directory-federation-services-ad-fs/
Today we’d like to walk you through AWS Identity and Access Management (IAM), federated sign-in through Active Directory (AD) and Active Directory Federation Services (ADFS). With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which resources users can access. Customers have the option of creating users and […]
Added 1 month ago
Data Driven Decisions - Amazon Web Services (AWS)
https://aws.amazon.com/campaigns/data-driven-decisions/
Make more informed decisions, improve operations, and differentiate with generative AI
Added 1 month ago
https://aws.amazon.com/about-aws/whats-new/2019/06/aws-security-hub-now-generally-available/?sc_channel=sm&sc_campaign=launch_&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=Launches_06-25-2019_SecurityHub_TWITTER&sc_content=Launches_06-25-2019_SecurityHub&linkId=69505869
https://aws.amazon.com/about-aws/whats-new/2019/06/aws-security-hub-now-generally-available/?sc_channel=sm&sc_campaign=launch_&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=Launches_06-25-2019_SecurityHub_TWITTER&sc_content=Launches_06-25-2019_SecurityHub&linkId=69505869
Added 1 month ago
https://aws.amazon.com/blogs/security/addressing-data-residency-with-aws/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=dataresidencywhitepaper&sc_category=AWS_Identity_and_Access_Management&linkId=47676704
https://aws.amazon.com/blogs/security/addressing-data-residency-with-aws/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=dataresidencywhitepaper&sc_category=AWS_Identity_and_Access_Management&linkId=47676704
AWS has released a new whitepaper that has been requested by many AWS customers: AWS Policy Perspectives: Data Residency. Data residency is the requirement that all customer content processed and stored in an IT system must remain within a specific country’s borders, and it is one of the foremost concerns of governments that want to […]
Watch "Serverless Bytes | Workshop on Building a Serverless App" on YouTube
https://youtu.be/Hv3YrP8G4ag
AWS serverless experts Chris Munns & Ronald Widha walk you through developing a simple serverless application. You will learn how to use AWS Lambda, Amazon...
Added 1 month ago