Welcome to above the clouds
AWS – Amazon S3 announces dual-layer server-side encryption for compliance workloads
Customers can now apply two independent layers of server-side encryption to objects in Amazon S3. Dual-layer server-side encryption with keys stored in AWS Key Management Service (DSSE-KMS) is designed to meet National Security Agency CNSSP 15 for FIPS compliance and Data-at-Rest Capability Package (DAR CP) Version 5.0 guidance for two layers of CNSA encryption. Amazon […]
AWS – Amazon Detective extends finding groups to Amazon Inspector
Amazon Detective has expanded finding groups to include Amazon Inspector network reachability and software vulnerability findings alongside Amazon GuardDuty findings. The combined threats and vulnerabilities help security analysts prioritize where they should focus their time by answering questions like “was this EC2 instance compromised because of a software vulnerability?” or “did this GuardDuty finding occur […]
AWS – Announcing the AWS Global Partner Security Initiative
Today, AWS announces the AWS Global Security Initiative which provides Global System Integrators (GSI) partners the opportunity to jointly develop innovative and transformational security and compliance services with AWS, delivering on the promise of actionable security data leveraging the power of Generative AI. This initiative focuses on security services and managed services for multi-cloud enterprises […]
AWS – AWS announces Software Bill of Materials export capability in Amazon Inspector
Amazon Inspector now offers the ability to export a consolidated Software Bill of Materials (SBOMs) for all Amazon Inspector monitored resources across your organization in industry standard formats, including CycloneDx and SPDX. With this new capability, you can use automated and centrally managed SBOMs to gain visibility into key information about your software supply chain. […]
AWS – Amazon Inspector announces the general availability of Code Scans for AWS Lambda function
Amazon Inspector now supports code scanning of Lambda functions, expanding the existing capability to scan Lambda functions and associated layers for software vulnerabilities in application package dependencies. With this expanded capability, Amazon Inspector now also scans your custom proprietary application code within a Lambda function for code security vulnerabilities such as injection flaws, data leaks, […]
AWS – Amazon EC2 Instance Connect supports SSH and RDP connectivity without public IP address
With EC2 Instance Connect Endpoint (EIC Endpoint), customers now have SSH and RDP connectivity to their EC2 instances without using public IP addresses. In past, customers assigned public IPs to their EC2 instances for remote connectivity. With EIC Endpoints, customers can have remote connectivity to their instances in private subnets, eliminating the need to use […]
AWS – Amazon Verified Permissions is now generally available
Today, AWS is announcing the general availability of Amazon Verified Permissions, service for fine-grained authorization and permissions management for applications that you build. Verified Permissions uses Cedar, an open-source language for access control, allowing you to define permissions as easy-to-understand policies. Use Verified Permissions to support role – and attribute-based access control in your applications. Read […]
Azure – General availability of Azure Front Door integration with managed identities
Azure Front Door supports using managed identity to access Key Vault without the need to generate, store, and rotate secrets. This is a secure service to service authentication method to enhance security. Read More for the details.
GCP – A better way to stay ahead of attacks: Security Command Center adds attack path simulation
To help secure increasingly complex and dynamic cloud environments, many security teams are turning to attack path analysis tools. These tools can enable them to better prioritize security findings and discover pathways that adversaries can exploit to access and compromise cloud assets such as virtual machines, databases, and storage buckets. Other attack path tools rely […]
GCP – Introducing simplified end-to-end TDIR for Chronicle
As cloud adoption continues to grow, so too does the number of cloud-born security threats. However, cloud environments can present significant opportunities to improve security with the right tools and processes in place. When it comes to effective threat detection, investigation and response (TDIR) in the cloud, modern solutions must ensure that the entire security […]
