fbpx

AWS re:Inforce 2022: Key announcements and program highlights

 <img src="https://www.infracom.com.sg/wp-content/uploads/2022/08/AWS-Re-Inforce-__-40-scaled.jpg" alt width="760" class="aligncenter size-full wp-image-26864" />     

 <pre>          <code>        &lt;p&gt;&lt;a href="https://reinforce.awsevents.com/" focus on="_blank" rel="noopener noreferrer"&gt;AWS re:Inforce&lt;/the&gt; came back to Boston, MA, july after 24 months in, and we were thus glad to stay person with clients back. The meeting featured over 250 classes and hands-on labs, 100 AWS companion sponsors, and over 6,000 attendees over 2 days. If you weren’t in a position to join us personally, or desire to revisit a few of the themes just, this blog blog post is for you. It summarizes all of the tips and announcements to where one can watch the function keynote, sessions, and companion lightning talks on requirement.&lt;/p&gt; 

<h2>Essential announcements</h2>
<p>Here are a few of the announcements that people made at AWS re:Inforce 2022.</p>
<ul>
<li><a href=”https://gaming console.aws.amazon.com/securityhub/home/#/free-mfa-security-key” focus on=”blank” rel=”noopener noreferrer”>MFA token purchasing portal&lt free;/the> – We’ve produced our free multi-aspect authentication (MFA) security essential program easier. We’ve an ordering portal inside the &lt now;a href=”https://aws.amazon.com/console/” focus on=”_blank” rel=”noopener noreferrer”>AWS Management Gaming console</the> where eligible clients can purchase their token. In reaction to customer need, <a href=”https://aws.amazon.com/blogs/security/eligible-customers-can-now-order-a-free-mfa-security-important/” rel=”noopener noreferrer” target=”_blank”>we’ve streamlined the ordering procedure</a>, for linked accounts especially. At this time, just US-based AWS accounts root users who’ve spent a lot more than $100 each month in the last a few months are eligible to put an purchase.</li>
<li><a href=”https://aws.amazon.com/sites/aws/new-for-amazon-guardduty-malware-detection-for-amazon-ebs-volumes” focus on=”_blank” rel=”noopener noreferrer”>New for Amazon GuardDuty – Malware Defense for Amazon EBS volumes</a> – Malware security is a function of &lt now;a href=”https://aws.amazon.com/guardduty/” focus on=”_blank” rel=”noopener noreferrer”>Amazon GuardDuty</a>. Existing clients can enable the GuardDuty Malware Safety feature with an individual click on in the GuardDuty system or through the GuardDuty API.</li>
<li><a href=”https://aws.amazon.com/about-aws/whats-new/2022/07/aws-security-hub-receives-amazon-guardduty-malware-protection-findings/” focus on=”_blank” rel=”noopener noreferrer”>AWS Safety Hub receives Amazon GuardDuty Malware Protection results&lt now;/the> – <a href=”https://aws.amazon.com/security-hub/” target=”_blank” rel=”noopener noreferrer”>AWS Security Hub</the> immediately receives Amazon GuardDuty Malware Protection findings now. GuardDuty Malware Protection results within Security Hub furthermore contain a study link which you can use to do more investigations in <a href=”https://aws.amazon.com/detective/” focus on=”_blank” rel=”noopener noreferrer”>Amazon Detective</the>.</li>
<li><a href=”https://aws.amazon.com/websites/aws/amazon-detective-supports-kubernetes-workloads-on-amazon-eks-for-security-investigations” focus on=”_blank” rel=”noopener noreferrer”>Amazon Detective works with Kubernetes workloads on Amazon EKS for protection investigations</the> – Analyze, investigate, and identify the primary cause of security results or suspicious handle plane action on <a href=”https://aws.amazon.com/eks/” focus on=”_blank” rel=”noopener noreferrer”>Amazon Elastic Kubernetes Services (Amazon EKS)</the> with Amazon Detective.</li>
<li><a href=”https://aws.amazon.com/about-aws/whats-brand-new/2022/07/amazon-macie-capability-securely-review-validate-sensitive-data-amazon-s3-object/” target=”_blank” rel=”noopener noreferrer”>Amazon Macie introduces new capacity to securely evaluation and validate sensitive information within an Amazon S3 item</a> – Clients may use this new capacity in <a href=”https://aws.amazon.com/macie/” focus on=”_blank” rel=”noopener noreferrer”>Amazon Macie</a> to examine and validate sensitive information within an &lt securely;a href=”https://docs.aws.amazon.com/AmazonS3/recent/userguide/UsingObjects.html” focus on=”_blank” rel=”noopener noreferrer”>Amazon Simple Storage space Service (Amazon S3) item</a> and do something as needed quickly. </li>
<li><a href=”https://aws.amazon.com/blogs/security/extend-aws-iam-roles-to-workloads-outside-of-aws-with-iam-roles-anywhere/” target=”_blank” rel=”noopener noreferrer”>IAM Roles Anywhere</the> – This new function extends the features of <a href=”https://aws.amazon.com/iam/” focus on=”_blank” rel=”noopener noreferrer”>AWS Identification and Access Administration (IAM)</the> functions to workloads beyond AWS. You may use IAM Roles to supply a secure method for on-premises servers Anywhere, containers, or applications to acquire temporary AWS credentials and take away the dependence on managing and creating long-term AWS credentials. </li>
<li><a href=”https://aws.amazon.com/marketplace/functions/vendor-insights” focus on=”_blank” rel=”noopener noreferrer”>AWS Market Vendor Insights</the> – This new function assists simplify third-party software chance assessments by compiling safety and compliance details in a unified dashboard. </li>
<li><a href=”https://aws.amazon.com/compliance/auditor-learning-path” focus on=”_blank” rel=”noopener noreferrer”>AWS Cloud Audit Academy – PCI DSS on AWS</the> – Cloud Audit Academy (CAA) PCI DSS on AWS may be the third training course in the AWS protection auditing learning route. This path is made for those people who are in auditing, danger, and compliance functions and who are involved with assessing regulated workloads in the cloud.</li>
<li><a href=”https://catalog.workshops.aws/threatmodel/en-All of us” target=”_blank” rel=”noopener noreferrer”>New workshop – Threat modeling the proper way for builders</the> – you’re launched by This workshop to the backdrop of threat modeling and just why to do it, as well as a few of the techniques and equipment for modeling systems, identifying threats, and choosing mitigations.</li>
<li><a href=”https://aws.amazon.com/about-aws/whats-new/2022/07/aws-waf-sensitivity-levels-sql-injection-rule-statements” focus on=”_blank” rel=”noopener noreferrer”>AWS WAF adds sensitivity amounts for SQL injection guideline statements</the> – <a href=”https://aws.amazon.com/waf/” focus on=”_blank” rel=”noopener noreferrer”>AWS WAF</a> now helps setting sensitivity ranges for SQL injection (SQLi) rule statements, giving clients greater handle over how AWS WAF evaluates requests with their applications for SQLi assaults.</li>
<li><a href=”https://aws.amazon.com/about-aws/whats-new/2022/07/aws-network-firewall-vpc-prefix-lists/” focus on=”_blank” rel=”noopener noreferrer”>AWS Network Firewall works with prefix lists&lt now;/the> – <a href=”https://aws.amazon.com/network-firewall/” focus on=”_blank” rel=”noopener noreferrer”>AWS System Firewall</the> supports &lt now;a href=”https://aws.amazon.com/vpc/?nc2=type_a” target=”_blank” rel=”noopener noreferrer”>Amazon Virtual Personal Cloud (Amazon VPC)</a> prefix lists to simplify administration of firewall plans and guidelines across your VPCs. Prefix lists allow you to group a number of CIDR blocks right into a individual object. You can team IP addresses that you often used in a prefix listing and reference this checklist in Network Firewall principle groups.</li>
<li><a href=”https://aws.amazon.com/about-aws/whats-fresh/2022/07/aws-single-sign-on-aws-sso-now-aws-iam-identity-middle/” target=”_blank” rel=”noopener noreferrer”>AWS SSO is aws IAM Identity Middle&lt now;/a> to be able to better represent the entire set of accounts and workforce management abilities that are component of <a href=”https://aws.amazon.com/iam/” focus on=”_blank” rel=”noopener noreferrer”>AWS Identification and Access Administration (IAM)</the>. It is possible to create user identities in &lt directly;a href=”https://aws.amazon.com/iam/identity-middle/?nc=sn&loc=2&dn=2″ focus on=”_blank” rel=”noopener noreferrer”>IAM Identity Middle</the>, or it is possible to connect your existing Dynamic Directory or standards-based identification provider. For more information, study <a href=”https://aws.amazon.com/blogs/security/scale-your-workforce-access-management-with-aws-iam-identity-center-previously-known-as-aws-sso/” target=”_blank” rel=”noopener noreferrer”>this post from the AWS Protection Blog</the>.</li>
<li>Enable protected communication with end-to-end encryption with <a href=”https://aws.amazon.com/wickr/” focus on=”_blank” rel=”noopener noreferrer”>AWS Wickr</the>, and collaborate on phone calls confidently. AWS Wickr encrypts text messages, calls, and data files with a proprietary, 256-bit end-to-end encryption process. No one but designed recipients can decrypt them, reducing the chance of person-in-the-middle episodes.</li>
</ul>
<h2>View on requirement</h2>
<p>You can view these talks and learning sessions on need also.</p>
<h3>Leadership and keynotes sessions</h3>
<p>View the <a href=”https://www.youtube.com/watch?v=PPunA7tPMyk&t=5s” target=”_blank” rel=”noopener noreferrer”>AWS re:Inforce 2022 keynote</the> where Amazon Chief Safety Officer Stephen Schmidt, AWS Chief Info Protection Officer CJ Moses, Vice President of AWS System Kurt Kufeld, and MongoDB Chief Details Security Officer Lena Wise share the most recent innovations in cloud safety from AWS and what that can be done to foster a lifestyle of protection in your organization. Additionally, it is possible to review all of the <a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf9kigmpFqzz8B5H5OHvjD_R” focus on=”_blank” rel=”noopener noreferrer”>leadership periods</a> to understand guidelines for managing safety, compliance, identity, and personal privacy in the cloud.</p>
<h3>Breakout sessions and companion lightning talks</h3>
<ul>
<li><a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf_mNvb8k6obS9KD7CldDla
” target=”_blank” rel=”noopener noreferrer”>Data Security and Privacy monitor</a> – Observe how AWS, clients, and partners interact to protect data. Find out about trends in information management, cryptography, data protection, data privacy, encryption, and key storage space and rotation.</li>
<li><a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf8KTHALyxNWaC-a_hGqRhey” focus on=”_blank” rel=”noopener noreferrer”>Governance, Danger, and Compliance monitor</a> – Dive in to the latest hot subjects in compliance and governance for security practitioners, and discover how exactly to automate compliance providers and tools for operational use.</li>
<li><a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf_lR3jgqw6zkUPypkYbmDFG” target=”_blank” rel=”noopener noreferrer”>Entry and identity Management monitor</the> – Listen to from AWS, customers, and companions on how to make use of <a href=”https://aws.amazon.com/identity/” focus on=”_blank” rel=”noopener noreferrer”>AWS Identity Providers</a> to control identities, resources, and permissions and at level securely. Figure out how to configure fine-grained accessibility controls for the employees, applications, and deploy and devices authorization guardrails across your company.</li>
<li><a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf_9NO6hkSunRmO5t5SykK3N” target=”_blank” rel=”noopener noreferrer”>Infrastructure and network Security monitor</a> – Gain practical knowledge on the ongoing solutions, tools, and items that AWS, customers, and partners use to safeguard the integrity and usability of these networks and data.</li>
<li><a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf-DbiF_763rp7IKyFeeQeU7″ target=”_blank” rel=”noopener noreferrer”>Threat Incident and Detection Response monitor</a> – Understand how AWS, clients, and partners obtain the visibility they have to enhance their security posture, decrease the risk profile of these environments, identify problems before they impact company, and implement incident reaction practices best.</li>
<li>It is possible to catch our &lt also;a href=”https://www.youtube.com/playlist?list=PL2yQDdvlhXf–z9RfhcU60fr35Lzi6i_z” target=”_blank” rel=”noopener noreferrer”>Companion Lightning Talks</the> on requirement.</li>
</ul>
<p>Program presentation downloads can be found &lt also;a href=”https://aws.amazon.com/events/events-articles/?awsf.filter-series=event-series%23reinforce&awsf.filter-session-kind=*all&awsf.filter-degree=*all&awsf.filter-topic=event-topic%23security-compliance&awsf.filter-market=*all&awsf.filter-language=vocabulary%23english&awsm.page-cards=1″ target=”_blank” rel=”noopener noreferrer”>on our AWS Event Contents</the> page. Consider signing up for us for even more in-person security understanding possibilities by registering for <a href=”https://reinvent.awsevents.com/” focus on=”_blank” rel=”noopener noreferrer”>AWS re:Invent 2022</the>, november 28 through December 2 in NEVADA which is held. We anticipate there seeing you!</p>
<p>If you’d prefer to discuss how these brand-new announcements can help your company improve its safety posture, AWS would be to help here. <a href=”https://aws.amazon.com/compliance/contact/” focus on=”_blank” rel=”noopener noreferrer”>Contact</the> nowadays your AWS account group.</p>
<p>&nbsp;<br>When you have feedback concerning this post, submit remarks in the<strong> Remarks</strong> area below. Should you have questions concerning this posting, <a href=”https://gaming console.aws.amazon.com/assistance/home” focus on=”_blank” rel=”noopener noreferrer”>contact AWS Assistance</the>.</p>
<p><strong>Want a lot more AWS Security news? Stick to us on <a name=”Twitter” href=”https://twitter.com/AWSsecurityinfo” focus on=”_blank” rel=”noopener noreferrer”>Twitter</the>.</strong></p>

<!– ‘”` –>

%d bloggers like this: