AWS compliance, governance, privacy and regulations
Top Stories
-
Tip
10 Jun 2022
AWS Control Tower aims to simplify multi-account management
Many organizations struggle to manage their vast collection of AWS accounts, but Control Tower can help. The service automates the creation and governance of user accounts. Continue Reading
-
Tip
09 Jul 2021
6 cloud governance framework principles and challenges
An organization that wants to control its cloud environment should examine how well it adheres to these key pillars of cloud governance. Continue Reading
-
Tip
26 Dec 2019
Perform an AWS security assessment with these tips and tools
Cloud security is an ongoing process that demands regular checks for potential vulnerabilities. Use tools such as Amazon Inspector to perform frequent and thorough cloud security assessments. Continue Reading
-
News
16 Dec 2019
Government Amazon antitrust inquiries scrutinize market dominance
The federal government and states are examining whether Amazon stifles competition and violates antitrust laws. The inquiries could result in action such as breakup of the tech giant. Continue Reading
-
News
03 Dec 2019
AWS Outposts brings hybrid cloud support -- but only for Amazon
AWS hybrid cloud support has arrived with the release of Outposts, but Amazon takes a different tack on multi-cloud and forbids co-branding partners from so much as using the term. Continue Reading
-
Answer
29 Oct 2019
How can you prevent a cloud data breach in your AWS environment?
Get a cloud expert's take on the technical factors involved in the Capital One data breach that exposed sensitive data of millions of the bank's customers. Continue Reading
-
Tip
19 Jun 2019
Secure Lambda functions and meet cloud compliance standards
While AWS Lambda itself is secure, users are responsible for the functions they run with the service. Set up CloudWatch, KMS and other safeguards to meet standards. Continue Reading
-
News
13 Jun 2019
AWS re:Inforce agenda underscores cloud security challenges
AWS re:Inforce this month in Boston is the first dedicated security conference by the industry's largest cloud provider. Here's an early look at the event's sweeping agenda. Continue Reading
-
Guide
31 May 2019
Use this AWS cloud security guide to protect workloads
Lock down your AWS environment with this guide to a strong security strategy. Discover common risks, and learn about the tools and techniques you can implement to avoid them. Continue Reading
-
News
24 May 2019
AWS Config Rules price change could cut cloud compliance costs
AWS Config Rules will switch to usage-based pricing, which could spur cloud compliance service adoption and be kinder to customers' budgets. Continue Reading
-
Feature
06 Nov 2018
AWS should address these user challenges at re:Invent 2018
SearchAWS contributors say Amazon's cloud platform still has shortcomings around data regulation, ops and integrations. They offer some ways AWS could solve these problems at re:Invent this year. Continue Reading
-
Photo Story
29 Oct 2018
Build an AWS multiregion architecture to meet global demand
Globally distributed applications offer a number of benefits, such as high availability. But IT teams need to put in the work to successfully deploy an AWS multiregion architecture. Continue Reading
-
Feature
26 Oct 2018
How Amazon Cognito fits into AWS security best practices
In this chapter excerpt from AWS: Security Best Practices on AWS, author Albert Anthony highlights how Amazon Cognito plays a role in application development on the AWS cloud. Continue Reading
-
Tip
17 Sep 2018
Centralize AWS account management with native SSO tool
Some third-party tools have longer track records, but AWS SSO offers an appealing alternative as a native service to handle cloud account management. Continue Reading
-
Feature
30 Jul 2018
AWS cost management tools wrangle unwieldy expenses
It can be a challenge to manage AWS costs, and native tools might not effectively address it. Learn how third-party vendors can help. Continue Reading
-
Feature
25 Jul 2018
Five AWS IAM best practices to bolster cloud security
To mitigate risks and protect cloud resources, many organizations rely on AWS IAM policies. Use these five tips to learn the basic features -- and limitations -- of the service. Continue Reading
-
Blog Post
29 Jun 2018
VMware-AWS service bubbles into new markets
With the VMware-AWS partnership, some customers were either reluctant or unable to use earlier versions of the service. Now, with the passage of time and corresponding product maturity, customers ... Continue Reading
-
Answer
28 Jun 2018
Use AWS tags to sharpen your cloud visibility
AWS resource tags provide admins with more visibility into their cloud deployment. Learn how to implement them with these best practices. Continue Reading
-
Tip
22 Jun 2018
Use service-linked IAM roles to simplify user permissions
While AWS IAM enables control over a cloud environment, it can become a management nightmare. Automate part of this process via service-linked roles to free up time for other tasks. Continue Reading
-
Tip
06 Jun 2018
Build an AWS incident response plan in 4 key steps
Enterprises should develop and test an incident response plan for an AWS deployment -- before a hack ever occurs. Follow these four steps to get started. Continue Reading
-
Tip
23 May 2018
Three AWS budget challenges that plague enterprises
Based on their size, companies face unique challenges around budget management in the cloud. Follow this expert advice to keep your costs in check. Continue Reading
-
Answer
21 May 2018
Remove AWS security credentials for outgoing employees
Personnel changes are inevitable at an enterprise, and security teams need to revoke AWS credentials accordingly to ensure the integrity of their cloud data. Continue Reading
-
Tip
07 May 2018
Rotate AWS access keys to boost cloud security
Access key rotation helps an enterprise avoid security lapses, and you can do it without disrupting your cloud environment. Follow these five steps to secure cloud access. Continue Reading
-
Quiz
13 Apr 2018
Test your knowledge of GDPR rights and AWS data protection
Is your enterprise GDPR-compliant? Take this quick quiz to test your knowledge of the EU regulation, as well as relevant AWS data protection tools. Continue Reading
-
Tip
09 Mar 2018
Zero-trust model boosts AWS infrastructure security
Security worries slowed early cloud adoption, and while many organizations eventually migrated, they failed to lock down access. Here's one way to combat that problem. Continue Reading
-
Tip
22 Feb 2018
HIPAA-eligible services nudge enterprises toward compliance
While certain services on AWS can help you ensure HIPAA compliance, don't view them as a complete replacement for proper security checks and approval processes. Continue Reading
-
Answer
13 Feb 2018
Avoid AWS access control mistakes to keep your cloud safe
If you get clumsy with AWS security, you can put your whole business at risk. Be wary of these common errors, and implement best practices to secure your workloads. Continue Reading
-
Photo Story
12 Feb 2018
Eight tips to roll a service or app into an AWS deployment
With dozens of services available, it can be a challenge to integrate new services or apps into an AWS deployment. Use these eight tips to get started. Continue Reading
-
Quiz
06 Feb 2018
Test your knowledge of the AWS shared responsibility model
Do you know where AWS' security responsibility ends and yours begins? Try your hand with this quick quiz. Continue Reading
-
Answer
27 Sep 2017
Prevent hacked AWS accounts from wreaking havoc
Security should be a top priority in public cloud deployment, but breaches are still possible. If your AWS account has been hacked, follow these steps to minimize the impact. Continue Reading
-
Tip
26 Sep 2017
AWS root account access is a treasure for attackers
Don't fall victim to a hacked root account. Create and work within new AWS accounts, and then apply the least amount of privilege necessary to prevent a costly mistake. Continue Reading
-
Tip
18 Apr 2014
AWS Management Console: Five steps to create an S3 bucket policy
In this AWS Management Console series, learn five ways to create an S3 bucket policy. Continue Reading