• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cyber Security Events 2023-2024
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

AWS Announces Three New Security Offerings: Amazon Detective, AWS IAM Access Analyzer and AWS Nitro Enclaves

December 4, 2019 By admin

Yesterday at AWS re:Invent, Amazon Web Services Inc. (AWS), an Amazon.com company (NASDAQ: AMZN), announced three new services and capabilities that make it easier for customers to build and operate securely:

Amazon Detective is a new security service that makes it easy for customers to conduct faster and more efficient investigations into security issues across their workloads (available in preview).

Amazon Detective helps security teams conduct faster and more effective investigations. Once enabled with a few clicks in the AWS Management Console, Amazon Detective automatically begins distilling and organizing data from AWS CloudTrail and Amazon Virtual Private Cloud (VPC) Flow Logs (with support for DNS logs coming soon) into a graph model that summarizes resource behaviors and interactions observed across a customer’s AWS environment. Using machine learning, statistical analysis, and graph theory, Amazon Detective produces tailored visualizations to help customers answer questions like ‘is this an unusual API call?’ or ‘is this spike in traffic from this instance expected?’ without having to organize any data or develop, configure, or tune their own queries and algorithms. Amazon Detective’s visualizations provide the details, context, and guidance to help analysts quickly determine the nature and extent of issues identified by AWS security services like Amazon GuardDuty, Amazon Inspector, Amazon Macie, and AWS Security Hub. Amazon Detective’s graph model and analytics are continuously updated as new telemetry becomes available from a customer’s AWS resources, allowing security teams to spend less time tending to constantly changing data sources. By letting the Amazon Detective service perform the necessary data sifting, security teams can more quickly move on to remediation. To learn more about Amazon Detective, visit https://aws.amazon.com/detective/.

AWS IAM Access Analyzer is a new AWS Identity and Access Management (IAM) capability that makes it simple for security teams and administrators to audit resource policies for unintended access (available today).

AWS IAM Access Analyzer makes it simple for security teams and administrators to validate that their policies provide only the intended access to resources. With one click in the IAM Console, customers can enable AWS IAM Access Analyzer across their account to analyze policies associated with their Amazon S3 buckets, AWS KMS keys, Amazon SQS queues, IAM roles, and AWS Lambda functions. Once enabled, IAM Access Analyzer uses a form of mathematical analysis called automated reasoning, which applies logic and mathematical inference to determine all possible access paths allowed by a resource policy. This means that AWS IAM Access Analyzer can analyze hundreds or even thousands of policies across a customer’s environment in seconds, and deliver detailed findings about resources that are accessible from outside the account. Customers can then review these findings in the IAM console, taking action on any that allow broader-than-intended access. AWS IAM Access Analyzer continuously monitors policies for changes, meaning customers no longer need to rely on intermittent manual checks in order to catch issues as policies are added or updated. AWS IAM Access Analyzer findings are accessible through the IAM, Amazon S3, and AWS Security Hub consoles and APIs, and can be exported as a report for auditing purposes. Using AWS IAM Access Analyzer, customers can proactively address any resource policies that violate their security and governance best practices around resource sharing and protect their resources from unintended access. To get started with AWS IAM Access Analyzer, visit https://aws.amazon.com/iam/features/analyze-access/.

AWS Nitro Enclaves is a new Amazon EC2 capability that makes it easy for customers to process highly sensitive data by partitioning compute and memory resources within an instance to create an isolated compute environment (available in preview early next year).

AWS Nitro Enclaves makes it easy for customers to create a completely isolated compute environment to process highly sensitive data. Each enclave is an isolated virtual machine with its own kernel, memory, and processor. Customers simply select an instance type and decide how much CPU and memory they want to designate to the enclave. There is no persistent storage, no ability to login to the enclave, and no networking connectivity beyond a secure local channel. AWS Nitro Enclaves provides the flexibility to partition varying combinations of CPU cores and memory from the parent instance when creating an enclave, enabling customers to match resources to the size and performance demands of their workloads. Customers can develop enclave applications using the AWS Nitro Enclaves SDK’s set of open-source libraries. The AWS Nitro Enclaves SDK also integrates with AWS Key Management Service (KMS), allowing customers to generate data keys and to decrypt them inside the enclave. AWS Nitro Enclaves supports a wide range of workloads and is available on a range of Nitro-based Amazon EC2 instance types, including M5, C5, R5 and I3en. To learn more about AWS Nitro Enclaves, visit https://aws.amazon.com/ec2/nitro/nitro-enclaves/.

Source: Amazon

Filed Under: Cybersecurity Market Tagged With: AWS IAM Access Analyzer, AWS Nitro Enclaves, Amazon Detective

Primary Sidebar

Market Analysis

How insurers thrive in a turbulent market
Leveraging Artificial Intelligence to Drive Cost Savings and Productivity in Uncertain Times
The shipping industry is undergoing a significant change with the influx of new vessels arriving just as the growth of trade is beginning to slow down
Climate change is increasingly affecting the production of beer ingredients
Unfulfilled Dreams: The Aftermath of China’s Stalled Real Estate Developments
Huawei on the Brink: Biden Administration Considers Cutting Off the Tech Giant”
Key Fire Industry Trends for 2023

Market Research Media

Streaming video, training, and gaming coming together to form a cohesive and diverse media and entertainment ecosystem
Turn Your Story into a Game: The Art of Gamifying Your Plot
The end of cheap money is redrawing the map of corporate earnings
The Future of Virtual Reality: How VR is Changing Industries
Market Research Media Survey: The State of Streaming Services
Media measurement services provide a holistic view of cross-media consumption
Gen Z ranks top in luxury sales

Secondary Sidebar

Technologies

The low tech unemployment rate and hiring activity confirms the long-term demand for tech talent
Virgin Orbit and SatRev Sign Launch Services Agreement
Harnessing the Power of Innovation for a Better Tomorrow
Breaking Down Silos: The Need for Cross-Sector Collaboration in Tackling Global Challenges
The SPIE Prism Awards recognized the best new optics and photonics products

Venture Capital

Gradient, a company specializing in eco-friendly heating and cooling solutions, has raised $18 million in a Series A funding round
The Importance of Diversity and Inclusion in the Workplace
Sequoia Capital announces its $195 Mln dedicated seed fund
Sublime Systems Secures $40 Million Series A to Electrify and Scale Decarbonized Cement Production
actyv.ai Raises Pre-Series A Funding to Fuel Global Expansion, Product Enhancement

Footer

Recent Posts

  • The Barcelona Cybersecurity Congress, 31 JANUARY – 2 FEBRUARY 2023, BARCELONA – GRAN VIA VENUE
  • Cybertech 2023 in Tel Aviv: Day 2, January 31, 2023
  • Protecting Your Privacy: A Look at the State of GDPR in the EU
  • Cybertech 2023 in Tel Aviv: Day 1, January 30, 2023
  • Identity has become the new attack surface
  • The Cybersecurity Risks of Automated Tutoring in Higher Education
  • The Cybersecurity Landscape in the Era of 5G: Challenges and Opportunities
  • The Hidden Dangers of Public USB Charging Ports: How to Protect Your Devices
  • How to encrypt and decrypt text messages with ChatGPT
  • The Impact of Artificial Intelligence on Cybersecurity

ESN

MedtechWomen Announces Tenth Annual MedtechVision Conference, September 9, 2022 at the Stanford University Francis C. Arrillaga Alumni Center
American Express Launches “Membership Week” June 14 Through June 18 to Showcase Why Life Is Better with Amex
BofA Securities 2022 SMID Cap Ideas Conference, August 10, 2022
Datadog’s Dash Conference, October 18-19 2022, Javis Center, NYC
cdCon 2022, taking place virtually online and in person, June 7-8 2022, Austin, Texas

Calendarial

The 6th annual Spinnaker Summit will be co-located with KubeCon NA and the CD Summit, October 24-25, 2022, Detroit
Daytona Beach 30th Annual Biketoberfest® Rally, OCTOBER 13-16, 2022
World Patients Alliance Hosts First World Patients Conference, October 15 2022, Rome, Italy
2022 South Carolina Manufacturing Conference and Expo, November 3-4, 2022, Greenville Convention Center, Greenville, South Carolina
GitHub Universe 2022, November 9-10, 2022

Tech Events

Blockchaining 2023: The crypto world is facing a crisis of confidence
SIGGRAPH 2022 Hybrid Conference Enjoys Notable Numbers with In-Person and Virtual Attendees
DesignCon 2021, August 16-18, 2021, San Jose McEnery Convention Center
Domain Auction, January 24, 2022
DesignCon 2022, April 5-7, 2022, Santa Clara Convention Center, Santa Clara, CA

Event Calendar

InfoComm, June 8-10 2022, Las Vegas
Ministry of Environment to Hold Online Environmental Exhibition “Virtual Japan Pavilion – Innovation for 2050 Net-zero”, March 3 – 23, 2021
Eurobike 2022, the world’s leading trade fair for bicycles, July 13-17 2022, Frankfurt, Germany
Electric & Hybrid Vehicle Technology Expo, September 13-15, 2022, Suburban Collection Showcase, Novi, Michigan
Blueprint Studios Launches New Virtual Experience Platform

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT