How to restrict Amazon S3 bucket access to a specific IAM role
February 14, 2025: This post was updated with the recommendation to restrict S3 bucket access to an IAM role by...
February 14, 2025: This post was updated with the recommendation to restrict S3 bucket access to an IAM role by...
Scammers are turning your favorite social media platforms into digital hunting grounds — learn how to spot and avoid their...
February 12, 2025: This post was republished to include new services and features that have launched since the original publication...
If you’d like to skip directly to the detailed mapping between the CISA guidance and AWS security controls and best...
AWS Network Firewall is a managed, stateful network firewall and intrusion protection service that you can use to implement firewall...
The AI Act (Regulation (EU) 2024/1689 of June 13, 2024, laying down harmonized rules on artificial intelligence) is the European...
In part 1 of this blog series, we walked through the risks associated with using sensitive data as part of...
Today, I’m thrilled to announce that Amazon Redshift, a widely used, fully managed, petabyte-scale data warehouse, is taking a significant...
Today, we released an updated version of the Aligning to the NIST Cybersecurity Framework (CSF) in the AWS Cloud whitepaper...
Spanish version » The Spanish National Cryptologic Center (CCN) has published a new STIC guide (CCN-STIC-887 Anexo A) that provides...