Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

aws.amazon.com

AWS Security Blog

Get the latest updates from AWS Security Blog directly as they happen.

Follow now 934 followers

Latest posts

Last updated 7 days ago

Authorize API Gateway APIs using Amazon Verified Permissions and Amazon Cognito

7 days ago

Externalizing authorization logic for application APIs can yield multiple benefits for Amazon...

Using Amazon Verified Permissions to manage authorization for AWS IoT smart home applications

8 days ago

This blog post introduces how manufacturers and smart appliance consumers can use...

2023 ISO 27001 certificate available in Spanish and French, and 2023 ISO 22301 certificate available in Spanish

13 days ago

French » Spanish » Amazon Web Services (AWS) is pleased to announce...

Integrate Kubernetes policy-as-code solutions into Security Hub

13 days ago

Using Kubernetes policy-as-code (PaC) solutions, administrators and security professionals can enforce organization...

How the unique culture of security at AWS makes a difference

14 days ago

Our customers depend on Amazon Web Services (AWS) for their mission-critical applications...

Winter 2023 SOC 1 report now available in Japanese, Korean, and Spanish

16 days ago

Japanese | Korean | Spanish We continue to listen to our customers,...

Accelerate security automation using Amazon CodeWhisperer

16 days ago

In an ever-changing security landscape, teams must be able to quickly remediate...

The curious case of faster AWS KMS symmetric key rotation

19 days ago

Today, AWS Key Management Service (AWS KMS) is introducing faster options for...

Detecting and remediating inactive user accounts with Amazon Cognito

22 days ago

For businesses, particularly those in highly regulated industries, managing user accounts isn’t...

TLS inspection configuration for encrypted egress traffic and AWS Network Firewall

30 days ago

In the evolving landscape of network security, safeguarding data as it exits...

How to generate security findings to help your security team with incident response simulations

about 1 month ago

Continually reviewing your organization’s incident response capabilities can be challenging without a...