-
Article
Mind sensitive data during a hybrid cloud migration
Many organizations fret over the security of sensitive data in hybrid cloud. And while that fear isn't totally irrational, there are solid options to keep your workloads safe. Read Now
-
Article
Quick steps to enable AWS multifactor authentication
AWS secures the underlying infrastructure, but organizations are responsible for locking down account access and integrity. Here are a few simple ways to establish MFA on AWS. Read Now
-
Article
Five AWS IAM best practices to bolster cloud security
To mitigate risks and protect cloud resources, many organizations rely on AWS IAM policies. Use these five tips to learn the basic features -- and limitations -- of the service. Read Now
-
Article
Test your AWS security tools knowledge
AWS offers a myriad of native tools and services that enterprises can use to protect their clouds. Sharpen your knowledge of these services, and tighten up your cloud. Read Now
Editor's note
Organizations should be mindful of security when their data is in AWS' cloud -- just as they would be with on-premises data. And as more teams move production workloads out of their own data centers, AWS cloud security takes on greater importance.
AWS' shared-responsibility model outlines where and when security falls upon the user. AWS is responsible for the security of the cloud, but AWS customers are responsible for the security of everything they run in the cloud -- data, applications, network traffic, etc. Follow this essential guide to learn about cloud vulnerabilities and how to lock down your AWS environment.
1Common AWS security challenges
When you tackle AWS cloud security, it's important to know what you're up against and what you're responsible for. A range of issues can expose critical data, from technical systems failures to misconfigurations and operational errors. Be aware of the frequent missteps and vulnerabilities users encounter on AWS, and learn how to prevent them from corrupting your cloud environment.
-
Article
Common security oversights within an AWS environment
There's often an assumption that AWS systems can't be tested, as they're hosted in the cloud; however, this is not the case. Discover common security oversights in AWS environments. Read Now
-
Article
To secure AWS, a human touch goes a long way
Even with recent advancements around cloud automation, security and resiliency still require a human touch. Sharpen your skills to keep AWS disruption-free. Read Now
-
Article
Use S3 bucket security best practices to cut off public access
AWS users need the benefits of S3 but not the security concerns that come along with it. Follow these guidelines to prevent the threat of public access to S3 buckets. Read Now
-
Article
Mind sensitive data during a hybrid cloud migration
Many organizations fret over the security of sensitive data in hybrid cloud. And while that fear isn't totally irrational, there are solid options to keep your workloads safe. Read Now
-
Article
Test your knowledge of the AWS shared responsibility model
Do you know where AWS' security responsibility ends and yours begins? Try your hand with this quick quiz. Read Now
2Strategies to establish user access control
Access control should play a crucial part in AWS cloud security. Carefully plan and consistently adjust to ensure your organization only grants necessary credentials. To organize access control, regularly rotate keys and remove AWS security credentials as part of personnel changes. Automate identity and access management (IAM) roles, and practice other verification strategies, such as the zero-trust model, to keep hackers and breaches at bay.
-
Article
Rotate AWS access keys to boost cloud security
Access key rotation helps an enterprise avoid security lapses, and you can do it without disrupting your cloud environment. Follow these five steps to secure cloud access. Read Now
-
Article
Remove AWS security credentials for outgoing employees
Personnel changes are inevitable at an enterprise, and security teams need to revoke AWS credentials accordingly to ensure the integrity of their cloud data. Read Now
-
Article
Zero-trust model boosts AWS infrastructure security
Security worries slowed early cloud adoption, and while many organizations eventually migrated, they failed to lock down access. Here's one way to combat that problem. Read Now
-
Article
Use service-linked IAM roles to simplify user permissions
While AWS IAM enables control over a cloud environment, it can become a management nightmare. Automate part of this process via service-linked roles to free up time for other tasks. Read Now
-
Article
Five AWS IAM best practices to bolster cloud security
To mitigate risks and protect cloud resources, many organizations rely on AWS IAM policies. Use these five tips to learn the basic features -- and limitations -- of the service. Read Now
3How to add AWS cloud security tools to your workflow
While AWS users are responsible for their own environments, AWS offers an extensive list of security tools, each built for a specific area of protection. For example, Amazon GuardDuty is used for threat detection, while AWS Multi-Factor Authentication provides tighter identification requirements. Take a closer look at some of the top tools for AWS cloud security.
-
Article
Quick steps to enable AWS multifactor authentication
AWS secures the underlying infrastructure, but organizations are responsible for locking down account access and integrity. Here are a few simple ways to establish MFA on AWS. Read Now
-
Article
Enlist AWS IoT security tools to defend your network
The internet of things offers great promise but introduces some unique risks. Research common vulnerabilities and follow best practices to secure your AWS IoT deployment. Read Now
-
Article
AWS Security Hub centralizes an organization's cloud security view
AWS Security Hub consolidates an admin's sprawl of cloud assets into dashboards for better security insights. But its resource limitations may blunt its effectiveness, for now. Read Now
-
Article
Test your AWS security tools knowledge
AWS offers a myriad of native tools and services that enterprises can use to protect their clouds. Sharpen your knowledge of these services, and tighten up your cloud. Read Now