Remove AWS Remove Compliance Remove Lambda Remove Security
article thumbnail

Use custom rules to validate your compliance

Xebia

AWS has a lot of controls built in, but what if you need more? AWS Config allows you to create your own rules. AWS has a built-in config rule for this called s3-bucket-logging-enabled. When you enable the AWS Foundational Security Best Practices v1.0.0 With AWS Config you can define InputParameters.

article thumbnail

Modernizing on AWS: Strategies, Benefits, and Partnerships with Xebia

Xebia

Cloud modernization has become a prominent topic for organizations, and AWS plays a crucial role in helping them modernize their IT infrastructure, applications, and services. Overall, discussions on AWS modernization are focused on security, faster releases, efficiency, and steps towards GenAI and improved innovation.

AWS 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

Many customers are looking for guidance on how to manage security, privacy, and compliance as they develop generative AI applications. We then discuss how building on a secure foundation is essential for generative AI.

article thumbnail

Best of both for CSPM: Lacework & AWS Security Hub

Lacework

Cloud security posture is an important part of any organization’s security practice. The problem is that security teams typically struggle with applying security policies consistently across the organization. Not exactly what a security team wants or needs when it comes to making their cloud environment more secure.

AWS 96
article thumbnail

Learning to Love Audit and Compliance - It’s Possible

Tenable

Securing running workloads in the public cloud and meeting compliance standards are non-negotiable for most organizations. As a result, audits and compliance exercises can cause delays and anxiety for security and compliance teams.

article thumbnail

Operate Efficiently and Securely: Rotating Prisma Cloud Access Keys

Prisma Clud

Ensuring appropriate access management is a critical component of any effective cloud security strategy. Prisma Cloud Access Keys are a secure way to enable programmatic access to the Prisma Cloud API, if you are setting up an external integration or automation. This post will explore practical examples in AWS, Azure, GCP and GitHub.

Cloud 59
article thumbnail

Leading Regional Home Building Company Benefits from Automated Patch Compliance

Blue Sentry

Part of integrating into the larger company came with new security compliance requirements. As such, the homebuilder requires a solution to ensure their security posture by maintaining operating systems patching remains up to date. The lambda code would be written to query EC2 tags and determine a patching option.