<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Lahiru Hewawasam</title>
    <description>The latest articles on DEV Community by Lahiru Hewawasam (@lahiruhewawasam).</description>
    <link>https://dev.to/lahiruhewawasam</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F936900%2Fd305ec7b-b2ad-4451-9f36-69a93db50862.jpg</url>
      <title>DEV Community: Lahiru Hewawasam</title>
      <link>https://dev.to/lahiruhewawasam</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/lahiruhewawasam"/>
    <language>en</language>
    <item>
      <title>What's New With AWS Security? | April Edition</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Tue, 07 May 2024 17:39:49 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-new-with-aws-security-april-edition-28c</link>
      <guid>https://dev.to/aws-builders/whats-new-with-aws-security-april-edition-28c</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Let's get ready for another installment of the series where we look at the latest and greatest updates to AWS security services.&lt;/p&gt;

&lt;p&gt;Feel free to check out the previous articles within this series to get yourself updated on what AWS has been up to in terms of security.&lt;/p&gt;

&lt;p&gt;Series: &lt;a href="https://dev.to/lahiruhewawasam/series/25596"&gt;What's New With AWS Security?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's dive into the latest announcements from the month of April.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's New With AWS Security Now?
&lt;/h2&gt;

&lt;p&gt;Let's take a look at the latest additions to the AWS security services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date:  04/04/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-iam-identity-center-europe-spain-asia-pacific-hyderabad-aws-region/"&gt;AWS IAM Identity Center is now available in the Europe (Spain) and Asia Pacific (Hyderabad) AWS Regions&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/05/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-cognito-asia-pacific-melbourne-region/"&gt;Amazon Cognito is now available in Asia Pacific (Melbourne) Region&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/10/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-verified-permissions-additional-regions/"&gt;Amazon Verified Permissions is available in four additional regions&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/11/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-iam-identity-center-shortcut-links-aws-access-portal/"&gt;AWS IAM Identity Center now offers a streamlined AWS access portal and shortcut links&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/12/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-detective-investigations-guardduty-monitoring/"&gt;Amazon Detective supports investigations for GuardDuty EC2 Runtime Monitoring&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-kms-automatic-key-rotation/"&gt;AWS KMS announces more flexible automatic key rotation&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/15/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-quicksight-account-instances-iam-identity-center/"&gt;Amazon QuickSight now supports account instances of IAM Identity Center&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/16/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-cognito-europe-spain-region/"&gt;Amazon Cognito is now available in Europe (Spain) Region&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-cognito-asia-pacific-hyderabad/"&gt;Amazon Cognito is now available in Asia Pacific (Hyderabad)&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/17/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-config-advanced-queries-resource-types/"&gt;AWS Config advanced queries support 35 new resource types&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/19/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/iam-roles-anywhere-modifying-mapping-certificate-attributes/"&gt;IAM Roles Anywhere now supports modifying the mapping of certificate attributes&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/22/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-inspector-agentless-vulnerability-assessments-ec2-ga/"&gt;Amazon Inspector agentless vulnerability assessments for Amazon EC2 are now Generally Available (GA)&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/29/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-firewall-manager-central-deployment-management-vpc-nacls/"&gt;AWS Firewall Manager now supports central deployment and management of VPC NACLs with common NACL policies&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/30/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-waf-canada-west-calgary-region/"&gt;AWS WAF is now available in the Canada West (Calgary) Region&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-security-hub-resource-tagging-standard/"&gt;AWS Security Hub announces the AWS Resource Tagging Standard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-config-usage-analysis-amazon-cloudwatch-metrics/"&gt;AWS Config simplifies usage analysis with Amazon CloudWatch metrics&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Noteworthy Updates To Services
&lt;/h2&gt;

&lt;p&gt;I must say that AWS has brought out some really interesting features and announcements in April. Let's take a look at some of the announcements that made my top pick.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. AWS Config&lt;/strong&gt;&lt;br&gt;
AWS Config has added support for 35 new resource types within its advanced queries. This brings in the versatility of being able to search the current configuration state of AWS resources either in a single account, region, or even AWS Config aggregator.&lt;/p&gt;

&lt;p&gt;Here are some of the newly supported resource types, But take a look at the &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/04/aws-config-advanced-queries-resource-types/"&gt;AWS release notes for the complete list&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AWS::Cognito::UserPoolClient&lt;/li&gt;
&lt;li&gt;AWS::Cognito::UserPoolGroup&lt;/li&gt;
&lt;li&gt;AWS::Connect::Instance&lt;/li&gt;
&lt;li&gt;AWS::Connect::QuickConnect&lt;/li&gt;
&lt;li&gt;AWS::EC2::CarrierGateway&lt;/li&gt;
&lt;li&gt;AWS::EC2::IPAMPool&lt;/li&gt;
&lt;li&gt;AWS::EC2::NetworkInsightsAccessScope&lt;/li&gt;
&lt;li&gt;AWS::EC2::NetworkInsightsPath&lt;/li&gt;
&lt;li&gt;AWS::EC2::TransitGatewayConnect&lt;/li&gt;
&lt;li&gt;AWS::EC2::TransitGatewayMulticastDomain&lt;/li&gt;
&lt;li&gt;AWS::ECS::CapacityProvider&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Amazon Inspector&lt;/strong&gt;&lt;br&gt;
AWS now lets customers run vulnerability assessments on EC2 instances that do not have the Amazon Inspector agent installed. With the introduction of the agentless vulnerability assessments for Amazon EC2, Amazon Inspector takes a snapshot of the EBS volumes to collect the software inventory where Amazon Inspector will start looking for any known software vulnerabilities.&lt;/p&gt;

&lt;p&gt;If you already have the SSM agent installed on your EC2 instances, then Amazon Inspector uses the agent for scanning.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. AWS Firewall Manager&lt;/strong&gt;&lt;br&gt;
AWS Firewall Manager enabled customers to manage various policies such as WAF, Shield, and security groups. With this latest update, AWS Firewall Manager now allows customers to manage VPC NACLs with common NACL policies.&lt;/p&gt;

&lt;p&gt;This brings an exciting opportunity for customers to implement baselines for protecting their resources such as pre-defined block rules that block certain traffic across multiple accounts. It also enables customers to centrally manage and apply these policies across multiple accounts.&lt;/p&gt;

&lt;p&gt;Now customers can also enforce NACLs by configuring automatic remediation to revert unintended or unwanted changes and maintain compliance with the security posture baselines set by the organization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;It's truly intriguing to see the innovations and updates set in motion by the team at AWS.&lt;/p&gt;

&lt;p&gt;Within this article, I've highlighted some of the major service announcements and feature introductions that were noteworthy. There may have been some announcements that I didn't cover in this month's announcement, therefore feel free to mention what you think was important in the comment section.&lt;/p&gt;

&lt;p&gt;Stay Tuned for the next edition of "What's New With AWS Security"!&lt;/p&gt;

&lt;p&gt;Thank you for reading. I hope you found this useful.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>What's New With AWS Security? | March Edition</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Tue, 07 May 2024 17:04:21 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-new-with-aws-security-march-edition-2cp8</link>
      <guid>https://dev.to/aws-builders/whats-new-with-aws-security-march-edition-2cp8</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;It's been a while since I've gotten into the latest and greatest releases for AWS security (It's better late than never).&lt;/p&gt;

&lt;p&gt;Feel free to check out the previous articles within this series to get yourself updated on what AWS has been up to in terms of security.&lt;/p&gt;

&lt;p&gt;Series: &lt;a href="https://dev.to/lahiruhewawasam/series/25596"&gt;What's New With AWS Security?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's get stuck into what happened in the month of March!&lt;/p&gt;

&lt;h2&gt;
  
  
  What's New With AWS Security Now?
&lt;/h2&gt;

&lt;p&gt;Let's take a look at the latest additions to the AWS security services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/04/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/aws-waf-rate-based-rules-configurable-time-windows/"&gt;AWS WAF enhances rate-based rules to support configurable time windows&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/06/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/amazon-guardduty-available-aws-canada-west-calgary-region/"&gt;Amazon GuardDuty is now available in AWS Canada West (Calgary) Region&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/07/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/aws-x-ray-data-events-aws-cloudtrail/"&gt;AWS X-Ray now supports data events in AWS CloudTrail&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/08/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/aws-waf-larger-body-inspections-regional-resources/"&gt;AWS WAF now supports larger request body inspections for regional resources&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/amazon-cognito-middle-east-uae-region/"&gt;Amazon Cognito is now available in Middle East (UAE) Region&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/11/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/amazon-verified-permissions-default-quota-authorization-apis/"&gt;Amazon Verified Permissions increases default quotas for authorization APIs&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/12/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/aws-backup-restore-testing-amazon-ebs-snapshots-archive/"&gt;AWS Backup now supports restore testing for Amazon Elastic Block Store (EBS) Snapshots Archive&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/14/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/amazon-cognito-europe-zurich-region/"&gt;Amazon Cognito is now available in Europe (Zurich) Region&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/18/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/aws-secrets-manager-redshift-serverless-data-warehouse/"&gt;AWS Secrets Manager announces support for Amazon Redshift Serverless data warehouse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/aws-identity-center-melbourne-region/"&gt;AWS IAM Identity Center is now available in the Asia Pacific (Melbourne) AWS Region&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/25/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/iam-roles-anywhere-credentials-valid-12-hours/"&gt;IAM Roles Anywhere now offers credentials that are valid for up to 12 hours&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 03/29/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/03/amazon-guardduty-ec2-runtime-monitoring-available/"&gt;Amazon GuardDuty EC2 Runtime Monitoring is now generally available&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Noteworthy Updates To Services
&lt;/h2&gt;

&lt;p&gt;Let's take a look at some of the announcements that caught my eye!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. AWS Secrets Manager&lt;/strong&gt;&lt;br&gt;
AWS Secrets Manager now supports user credential rotation for Amazon Redshift Serverless. Now you can easily create and rotate user credentials and API keys throughout their lifecycle.&lt;/p&gt;

&lt;p&gt;These new integrations bring the total count of the AWS Secrets Manager &lt;a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/integrating.html"&gt;supported services&lt;/a&gt; to more than 50!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Amazon GuardDuty&lt;/strong&gt;&lt;br&gt;
Amazon GuardDuty now lets customers monitor and gain visibility into the on-host, operating system–level activities and provides container-level context of detected threats.&lt;/p&gt;

&lt;p&gt;This enhances the existing capabilities of GuardDuty which can help detect abnormal and suspicious activities within your AWS accounts and workloads.&lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;There have been some major strides taken by the team at AWS to enhance and stay on top of the security game and I can't wait for what is in store for us in the future.&lt;/p&gt;

&lt;p&gt;Within this article, I've highlighted some of the major service announcements and feature introductions that were noteworthy. There may have been some announcements that I didn't cover in this month's announcement, therefore feel free to mention what you think was important in the comment section.&lt;/p&gt;

&lt;p&gt;Stay Tuned for the next edition of "What's New With AWS Security"!&lt;/p&gt;

&lt;p&gt;Thank you for reading. I hope you found this useful.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>What's New With AWS Security? | February Edition</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Sat, 09 Mar 2024 03:30:00 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-new-with-aws-security-february-edition-2l5c</link>
      <guid>https://dev.to/aws-builders/whats-new-with-aws-security-february-edition-2l5c</guid>
      <description>&lt;p&gt;It's that time of the month where we go through the latest and greatest updates to AWS security services.&lt;/p&gt;

&lt;p&gt;Feel free to check out the previous articles within this series to get yourself updated on what AWS has been up to in terms of security.&lt;/p&gt;

&lt;p&gt;Series: &lt;a href="https://dev.to/lahiruhewawasam/series/25596"&gt;What's New With AWS Security?&lt;/a&gt;&lt;br&gt;
 &lt;/p&gt;

&lt;h2&gt;
  
  
  What's New With AWS Security Now?
&lt;/h2&gt;

&lt;p&gt;It's not everyday that you get to hear something being updated on AWS security services and it was a case where AWS only announced a handful of updates to its services.&lt;/p&gt;

&lt;p&gt; &lt;br&gt;
Let's take a look at the latest additions to the AWS security services.&lt;/p&gt;

&lt;p&gt; &lt;br&gt;
&lt;strong&gt;Announcement Date: 01/02/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-cognito-signing-encryption-identity-provider-initiated-sso/"&gt;Amazon Cognito adds signing, encryption, and Identity Provider-initiated SSO for SAML federation&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 06/02/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/aws-waf-captcha-improvements/"&gt;AWS WAF announces Captcha improvements&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 09/02/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-guardduty-malware-protection-ebs-managed-key-encrypted-volumes/"&gt;Amazon GuardDuty Malware Protection now supports scanning EBS managed key encrypted volumes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/aws-iot-core-online-certificate-status-protocol-stapling-server-certificates/"&gt;AWS IoT Core supports Online Certificate Status Protocol Stapling for server certificates&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 13/02/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-guardduty-runtime-monitoring-protects-clusters-shared-vpc/"&gt;Amazon GuardDuty Runtime Monitoring protects clusters running in shared VPC&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 23/02/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/remediating-non-compliant-resourcesaws-config-rule-canada-west-calgary/"&gt;Remediating non-compliant resources with AWS Config rules is now available in Canada West (Calgary)&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 29/02/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-security-lake-audit-logs-eks/"&gt;Amazon Security Lake now supports audit logs from Amazon EKS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/amazon-security-lake-analytics-ocsf-iceberg/"&gt;Amazon Security Lake enhances analytics performance with OCSF 1.1.0 and Apache Iceberg&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/02/aws-backup-restore-testing-amazon-aurora-continuous-backups/"&gt;AWS Backup now supports restore testing for Amazon Aurora continuous backups&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Noteworthy Updates To Services
&lt;/h2&gt;

&lt;p&gt;Like always some of these announcements stood out of the rest of the list, so let's take a look at them!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Amazon Cognito&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Amazon Cognito now comes with 3 brand new features that SAML federation:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1. IdP-Initiated Login
2. Encrypted SAML assertion/response
3. Signed SAML requests
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;This &lt;a href="https://www.youtube.com/watch?v=1vYUt2u2EB0"&gt;video&lt;/a&gt; talks in-depth about these new features and how you can also start using it today!&lt;br&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Amazon GuardDuty&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now you can run &lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/on-demand-malware-scan.html"&gt;on-demand&lt;/a&gt; malware scans on EBS volumes attached to EC2 instances and container workloads that are encrypted by EBS managed keys!&lt;/p&gt;

&lt;p&gt;Findings may include information such as Threat, File Name, File Path, EC2 instance ID, Container ID and Container Image used&lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/runtime-monitoring.html"&gt;Amazon GuardDuty Runtime Monitoring&lt;/a&gt; can now detect threats running in all supported compute services running in a &lt;a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-sharing.html"&gt;shared VPC&lt;/a&gt;.&lt;br&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. AWS WAF&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AWS WAF introduced support for 8 additional languages within the audio captcha; Newly added languages include Spanish, German, French, Portuguese, Italian, Turkish, Dutch, and Arabic.&lt;/p&gt;

&lt;p&gt;The service also introduced a new form of captcha puzzle called Grid Captcha. This improves user pass through rates thus improving the overall user experience.&lt;/p&gt;

&lt;p&gt;Admins can now deactivate or rotate any captcha API keys if they suspect any suspicious activity before they can be misused.&lt;br&gt;
 &lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;I must say that the month of February brought some good improvements into the AWS security services arsenal that's definitely going to help organizations stay on top of their security game!&lt;/p&gt;

&lt;p&gt;Within this article I've highlighted some of the major service announcements and feature introductions that were noteworthy. There may have been some announcements that I didn't cover in this month's announcement, therefore feel free to mention what you think was important in the comment section.&lt;/p&gt;

&lt;p&gt;Stay Tuned for the next edition of "What's New With AWS Security"!&lt;/p&gt;

&lt;p&gt;Thank you for reading. I hope you found this useful.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>What's New With AWS Security? | January Edition</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Thu, 08 Feb 2024 14:51:45 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-new-with-aws-security-january-edition-2hpa</link>
      <guid>https://dev.to/aws-builders/whats-new-with-aws-security-january-edition-2hpa</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb5fgcm2izk7aw7vbfagu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb5fgcm2izk7aw7vbfagu.png" alt="Banner Image" width="800" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;br&gt;
We're back with the third installment of the series where I walk you through the latest and greatest updates to AWS security services!&lt;/p&gt;

&lt;p&gt;Feel free to check out the previous articles within this series to get yourself updated on what AWS has been up to in terms of security.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Series: &lt;a href="https://dev.to/lahiruhewawasam/series/25596"&gt;What's New With AWS Security?&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  What's New With AWS Security Now?
&lt;/h2&gt;

&lt;p&gt;If you thought December was a silent month for AWS security announcements, then you're not in for a treat cause January didn't see a lot of updates.&lt;/p&gt;

&lt;p&gt;However, this being said I am excited for some of the updates that AWS has released since these are some features that I've been eagerly waiting for.&lt;/p&gt;

&lt;p&gt;Let's check out the latest additions to the AWS security services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date:  03/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/amazon-cognito-identity-pools-quota-management-aws-service-quotas/"&gt;Amazon Cognito identity pools enhances quota management in AWS Service Quotas&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 04/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/simplified-wordpress-setup-amazon-lightsail/"&gt;Introducing simplified WordPress setup on Amazon Lightsail&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 10/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/amazon-route-53-resolver-dns-firewall-query-type-filtering/"&gt;Amazon Route 53 Resolver DNS Firewall now supports query type filtering&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 16/01/2024&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/aws-private-ca-mobile-drivers-license-certificates/"&gt;AWS Private CA now helps issue ISO/IEC mobile driver’s license certificates&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 18/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/aws-iam-identity-center-middle-east-uae-region/"&gt;AWS IAM Identity Center is now available in the Middle East (UAE) AWS Region&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 23/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/amazon-inspector-cis-benchmark-assessments-operating-systems-ec2-instances/"&gt;Amazon Inspector now supports CIS Benchmark assessments for operating systems in EC2 instances&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 24/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/aws-payment-cryptography-options-importing-exporting-keys/"&gt;AWS Payment Cryptography launches additional options for importing and exporting keys&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 25/01/2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/aws-private-ca-revocation-matter-certificates/"&gt;AWS Private CA now supports revocation for Matter certificates&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2024/01/provisioned-capacity-api-limits-amazon-cognito/"&gt;Provisioned capacity for API limits now available in Amazon Cognito&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Noteworthy Updates To Services
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Amazon Route 53 Resolver DNS Firewall
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;   With this new release, the DNS firewall supports blocking based on the DNS query type&lt;/li&gt;
&lt;li&gt;   For example, you can now choose to block outbound queries to TXT records since this is a common approach used for DNS tunneling-based attacks&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Amazon Inspector
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;   CIS benchmarks are now supported on Amazon EC2 operating systems&lt;/li&gt;
&lt;li&gt;   This release allows you to benchmark your EC2s against the CIS benchmark without the need for additional third-party services&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;This is probably the shortest installment of the What's New with AWS Security series since there aren't a lot of noteworthy updates coming out in January.&lt;/p&gt;

&lt;p&gt;I've highlighted some of the major service announcements and feature introductions that were noteworthy. There may have been some announcements that I didn't cover in this month's announcement, therefore feel free to mention what you think was important in the comment section.&lt;/p&gt;

&lt;p&gt;Stay Tuned for the next edition of "What's New With AWS Security"!&lt;/p&gt;

&lt;p&gt;Thank you for reading. I hope you found this useful.&lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>cloud</category>
    </item>
    <item>
      <title>What's New With AWS Security? | December Edition</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Wed, 03 Jan 2024 05:00:00 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-new-with-aws-security-december-edition-4bao</link>
      <guid>https://dev.to/aws-builders/whats-new-with-aws-security-december-edition-4bao</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4qui55f429dpyaeqf6hy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4qui55f429dpyaeqf6hy.png" alt="Banner Image" width="800" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;br&gt;
Welcome back to my series where I take you through the latest and greatest updates for AWS security services!&lt;br&gt;
 &lt;/p&gt;

&lt;h2&gt;
  
  
  AWS re:Invent 2023
&lt;/h2&gt;

&lt;p&gt;If you haven't been living under a rock for November, you would have probably known that AWS had &lt;a href="https://aws.amazon.com/blogs/aws/top-announcements-of-aws-reinvent-2023/"&gt;AWS re:Invent&lt;/a&gt; where they unveiled a bunch of new services and functions for all of their users.&lt;/p&gt;

&lt;p&gt;It's no surprise that this time the theme was focused predominantly on artificial intelligence, with the folks over at AWS flexing their muscles by showing off what they've come up with and it's safe to say it was a treat with a lot of focus directed at &lt;a href="https://aws.amazon.com/q/"&gt;Amazon Q&lt;/a&gt;; their latest take on a generative AI assistant that enables users to get faster and accurate answers that are tailored to their businesses.&lt;/p&gt;

&lt;p&gt;If you're thinking how that is even possible, then let me give you the short answer. It's all because of its &lt;a href="https://docs.aws.amazon.com/amazonq/latest/business-use-dg/connectors-list.html"&gt;connectors&lt;/a&gt; that allow Amazon Q to learn about your business to give customized answers.&lt;/p&gt;

&lt;p&gt;Click on the links below to learn more about the services and features announced during this year's re:Invent or to see if you've missed out on some awesome announcements.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://reinvent.awsevents.com/on-demand/"&gt;AWS re:Invent 2023 Keynotes&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://reinvent.awsevents.com/innovation-talks/"&gt;AWS re:Invent 2023 Innovation Talks&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwh9368vpnumjm385rt15.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwh9368vpnumjm385rt15.png" alt="re:Invent 2023 Image" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What's New With AWS Security Now?
&lt;/h2&gt;

&lt;p&gt;Let's put a pin on the re:Invent talks and dive right into why we're here! and that's to check out what happened in December and all the cool additions that AWS made to their security services!&lt;/p&gt;

&lt;p&gt;I must say December was a very quiet month in terms of releases for security services since most of the releases came with re:Invent and within November; which I covered within the &lt;a href="https://dev.to/aws-builders/whats-new-with-aws-security-november-edition-1621"&gt;November Edition&lt;/a&gt; of this series.&lt;/p&gt;

&lt;p&gt;So without further ado, let's check out the latest additions to the AWS security services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 05/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-secrets-manager-service-level-agreement/"&gt;AWS Secrets Manager announces 99.99% Service Level Agreement&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 18/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-redshift-single-sign-on-quicksight-aws-lake-formation/"&gt;Amazon Redshift supports single sign-on with Amazon QuickSight and AWS Lake Formation&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-security-hub-15-security-controls/"&gt;AWS Security Hub launches 15 new security controls&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-cognito-user-pools-customize-access-tokens/"&gt;Amazon Cognito user pools now support the ability to customize access tokens&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-eks-controls-iam-cluster-access-management/"&gt;Amazon EKS introduces simplified controls for IAM cluster access management&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 19/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-audit-manager-pci-4-0-automated-evidence-collection/"&gt;AWS Audit Manager now supports PCI 4.0 for automated evidence collection&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-network-firewall-egress-tls-inspection-available-all-regions/"&gt;AWS Network Firewall egress TLS inspection is now available in all regions&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 20/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-cognito-asia-pacific-jakarta-region/"&gt;Amazon Cognito is now available in Asia Pacific (Jakarta) Region&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-cognito-africa-cape-town-region/"&gt;Amazon Cognito is now available in the Africa (Cape Town) Region&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 21/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-resource-access-manager-canada-calgary-region/"&gt;AWS Resource Access Manager is now available in the AWS Canada West (Calgary) Region&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-config-1000-config-rules-region-account/"&gt;AWS Config now supports 1000 AWS Config rules per AWS Region per account&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 26/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/remediating-non-compliant-resources-aws-config-rules-israel-tel-aviv/"&gt;Remediating non-compliant resources with AWS Config rules is now available in Israel (Tel Aviv)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/iam-roles-anywhere-additional-aws-regions/"&gt;IAM Roles Anywhere is now available in 6 additional AWS Regions&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 28/12/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-eks-assigning-ec2-security-groups-ipv6-kubernetes-pods/"&gt;Amazon EKS now supports assigning EC2 security groups to IPv6 Kubernetes pods&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-directory-service-microsoft-ad-ad-connector-calgary/"&gt;AWS Directory Service for Microsoft AD and AD Connector available in Calgary&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Noteworthy Updates To Services
&lt;/h2&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;
  
  
  1. AWS Secrets Manager
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;  AWS Secrets Manager now maintains an SLA of at least 99.99%; which equates to 52.60 minutes per year or 13.15 minutes per quarter&lt;/li&gt;
&lt;li&gt;  If these SLAs are not met, you are eligible for service credits according to the &lt;a href="https://aws.amazon.com/secrets-manager/sla/"&gt;AWS Secrets Manager SLA&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. AWS Security Hub
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;  The service also supports additional services such as Amazon FSx and AWS Private CA, while introducing new controls for previously supported services such as Amazon EC2, Amazon EKS, and Amazon S3.&lt;/li&gt;
&lt;li&gt;  AWS Security Hub introduced 15 new security controls that it can evaluate. You simply need to enable to respective security standard that they belong to and AWS Security Hub will start evaluating them automatically.&lt;/li&gt;
&lt;li&gt;  If you have already enabled the relevant standard, then AWS Security Hub will automatically evaluate these new controls&lt;/li&gt;
&lt;li&gt;  List of new security controls:

&lt;ul&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/backup-controls.html#backup-1"&gt;[Backup.1] AWS Backup recovery points should be encrypted at rest&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;   &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/dynamodb-controls.html#dynamodb-6"&gt;[DynamoDB.6] DynamoDB tables should have deletion protection enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-51"&gt;[EC2.51] EC2 Client VPN endpoints should have client connection logging enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/eks-controls.html#eks-8"&gt;[EKS.8] EKS clusters should have audit logging enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/emr-controls.html#emr-2"&gt;[EMR.2] Amazon EMR block public access setting should be enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/fsx-controls.html#fsx-1"&gt;[FSx.1] FSx for OpenZFS file systems should be configured to copy tags to backups and volumes&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/macie-controls.html#macie-1"&gt;[Macie.1] Macie should be enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/msk-controls.html#msk-2"&gt;[MSK.2] MSK clusters should have enhanced monitoring configured&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/neptune-controls.html#neptune-9"&gt;[Neptune.9] Neptune DB clusters should be deployed across multiple Availability Zones&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-1"&gt;[NetworkFirewall.1] Network Firewall firewalls should be deployed across multiple Availability Zones&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/networkfirewall-controls.html#networkfirewall-2"&gt;[NetworkFirewall.2] Network Firewall logging should be enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/opensearch-controls.html#opensearch-10"&gt;[OpenSearch.10] OpenSearch domains should have the latest software update installed&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/pca-controls.html#pca-1"&gt;[PCA.1] AWS Private CA root certificate authority should be disabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-19"&gt;[S3.19] S3 access points should have block public access settings enabled&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;  &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/s3-controls.html#s3-20"&gt;[S3.20] S3 general purpose buckets should have MFA delete enabled&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Amazon EKS
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;  You can now use EC2 security groups with Amazon EKS in clusters that use IPv6&lt;/li&gt;
&lt;li&gt;  Previously administrators were constrained to the limits of IPv6, but NO MORE!&lt;/li&gt;
&lt;li&gt;  Now you can use Amazon VPC CNI &lt;a href="https://aws.amazon.com/blogs/containers/amazon-vpc-cni-now-supports-kubernetes-network-policies/"&gt;network policies&lt;/a&gt; to control the traffic within your cluster and use security groups to control access to AWS services outside the cluster.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;I've highlighted some of the major service announcements and feature introductions that were noteworthy. There may have been some announcements that I didn't cover in this month's announcement, therefore feel free to mention what you think was important in the comment section.&lt;/p&gt;

&lt;p&gt;Stay Tuned for the next edition of "What's New With AWS Security"!&lt;/p&gt;

&lt;p&gt;Thank you for reading. I hope you found this useful.&lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>cloud</category>
    </item>
    <item>
      <title>What's New With AWS Security? | November Edition</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Mon, 04 Dec 2023 20:42:22 +0000</pubDate>
      <link>https://dev.to/aws-builders/whats-new-with-aws-security-november-edition-1621</link>
      <guid>https://dev.to/aws-builders/whats-new-with-aws-security-november-edition-1621</guid>
      <description>&lt;p&gt;If you're also like me, then you must have also had a tough time understanding and keeping up with all the new services and updates that AWS provides for its security services.&lt;/p&gt;

&lt;p&gt;I am going to be starting this first edition of a series that will focus on consolidating the most important and noteworthy updates in the realm of AWS security so that you have a single place to keep yourself up-to-date.&lt;/p&gt;

&lt;p&gt;Without further ado, let's get stuck right into this month's noteworthy updates and releases on AWS security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 02/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-iam-action-accessed-information-60-services/"&gt;AWS IAM action last accessed information for more than 60 additional services&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/iam-access-analyzer-policy-generation-coverage-over-200-aws-services/"&gt;IAM Access Analyzer policy generation now extends coverage to over 200 AWS services&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 09/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-guardduty-machine-learning-capability-threat-detection-eks-detections/"&gt;Amazon GuardDuty introduces new machine learning capability to enhance threat detection for Amazon EKS detections&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 10/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-cloudfront-unified-security-dashboard/"&gt;Amazon CloudFront announces unified security dashboard&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 14/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/new-dashboards-aws-web-application-firewall/"&gt;Announcing new dashboards in AWS Web Application Firewall&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 15/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-audit-manager-integrates-metricstream/"&gt;AWS Audit Manager launches its first GRC integration with MetricStream&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-cloudtrail-lake-pricing-option-optimized-flexible-retention/"&gt;AWS CloudTrail Lake announces new pricing option optimized for flexible retention&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 16/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-managed-microsoft-ad-identity-active-roles/"&gt;AWS Managed Microsoft AD adds support for One Identity Active Roles&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/organization-wide-iam-condition-keys-restrict-aws-service-to-service-requests/"&gt;New organization-wide IAM condition keys to restrict AWS service-to-service requests&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-iam-identity-center-mfa-defaults-iam-identity-center-instances/"&gt;AWS IAM Identity Center enhances the multi-factor authentication (MFA) defaults for new IAM Identity Center instances&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 17/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-iam-identity-center-account-instance-evaluation-adoption-managed-applications/"&gt;AWS IAM Identity Center provides new account instance for faster evaluation and adoption of AWS managed applications&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-iam-identity-center-apis-automate-access-applications/"&gt;AWS IAM Identity Center now provides new APIs to automate access to applications&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 20/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-iam-identity-center-apis-workforce-access/"&gt;Announcing AWS IAM Identity Center APIs for visibility into workforce access to AWS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-verified-permissions-supports-batch-authorization/"&gt;Amazon Verified Permissions now supports batch authorization&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 21/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-verified-permissions-enhanced-visual-mode-schema-editing/"&gt;Amazon Verified Permissions now provides an enhanced visual mode for schema editing&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Announcement Date: 26/11/2023&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-analytics-users-data-access-iam-identity-center/"&gt;AWS Analytics simplify users’ data access across services with IAM Identity Center&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-detective-group-summaries-generative-ai/"&gt;Amazon Detective introduces finding group summaries using generative AI&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-detective-log-retrieval-security-lake/"&gt;Amazon Detective now supports log retrieval from Amazon Security Lake&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-detective-investigations-iam/"&gt;Amazon Detective announces investigations for IAM&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-detective-security-guardduty-ecs-monitoring/"&gt;Amazon Detective supports security investigations for Amazon GuardDuty ECS Runtime Monitoring&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-guardduty-ecs-runtime-monitoring-fargate/"&gt;Introducing Amazon GuardDuty ECS Runtime Monitoring, including AWS Fargate&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-secrets-manager-batch-retrieval-secrets/"&gt;AWS Secrets Manager now supports batch retrieval of secrets&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/iam-access-analyzer-custom-policy-check/"&gt;IAM Access Analyzer introduces custom policy checks powered by automated reasoning&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-config-periodic-recording/"&gt;AWS Config now supports periodic recording: Efficiently scale your change tracking&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/customize-security-controls-aws-security-hub/"&gt;New from AWS: You can now customize security controls in AWS Security Hub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/iam-access-analyzer-inspecting-unused-access/"&gt;IAM Access Analyzer now simplifies inspecting unused access to guide you toward least privilege&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-guardduty-runtime-monitoring-amazon-ec2-preview/"&gt;Amazon GuardDuty now supports runtime monitoring for Amazon EC2 (Preview)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-inspector-aws-lambda-code-scanning/"&gt;Amazon Inspector expands AWS Lambda code scanning with generative AI powered remediation&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-config-generative-ai-powered-natural-language-querying-preview/"&gt;AWS Config launches generative AI-powered natural language querying (Preview)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-security-hub-central-configuration/"&gt;Announcing new central configuration capabilities in AWS Security Hub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-inspector-agentless-assessments-ec2-preview/"&gt;Amazon Inspector agentless vulnerability assessments for Amazon EC2 now in preview&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/dashboard-enhancements-aws-security-hub/"&gt;Announcing major dashboard enhancements in AWS Security Hub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/new-finding-enrichment-aws-security-hub/"&gt;Announcing new finding enrichment in AWS Security Hub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-cyber-insurance-competency-partner-quote/"&gt;Request a Cyber Insurance Quote from an AWS Cyber Insurance Competency Partner&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/aws-cyber-insurance-competency-partner-quote/"&gt;AWS Built-in Competency Partner software automates Installation for customers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt; &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-inspector-image-security-developer-tools/"&gt;Amazon Inspector enhances container image security by integrating with developer tools&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Noteworthy Updates To Services:
&lt;/h2&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  1. AWS IAM
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;  AWS IAM now provides last accessed information more an &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor-action-last-accessed.html"&gt;additional 60 services&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;  AWS IAM expands its policy generation to identify actions of over &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-policy-generation-action-last-accessed-support.html"&gt;200 AWS services&lt;/a&gt;!
 &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. AWS Security Hub
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt; Customize certain specifics such as password policies, retention frequencies and other attributes without abandoning the use of managed controls&lt;/li&gt;
&lt;li&gt; Setup delegated administrators for all regions at once and configure CSPM capabilities such as standards and controls on all or some accounts globally without needing to configure them on an account or region basis&lt;/li&gt;
&lt;li&gt; Custom dashboard and widget capabilities&lt;/li&gt;
&lt;li&gt; New data enrichment adds resource tag, a new application tag, and account name tag into every finding ingested into Security Hub for findings from services such as Amazon GuardDuty, Amazon Inspector, and AWS IAM Access Analyzer.
 &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  3. Amazon Inspector
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt; Amazon Inspector enables generative AI powered remediation for findings with automated reasoning&lt;/li&gt;
&lt;li&gt; Amazon Inspector now integrates with Jenkins and TeamCity for container image assessments. Once activated Amazon Inspector monitors your environment for known vulnerabilities within EC2 instances, container images in Amazon Elastic Container Registry, CI/CD tools and Lambda functions.&lt;/li&gt;
&lt;li&gt; Enable Amazon Inspector hybrid scan mode for agentless vulnerability assessments on your EC2 instances (Preview Feature)
 &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  4. Amazon Detective
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt; Group summaries with the use of generative AI to automatically analyze and provide insights into findings in natural language&lt;/li&gt;
&lt;li&gt; Amazon Detective integrates with Amazon Security Lake to enable querying and log retrieval from Security Lake. This helps you get additional information from AWS CloudTrails and Amazon VPC Flow logs within the security lake when conducting investigations within Amazon Detective&lt;/li&gt;
&lt;li&gt; Automatically investigate AWS IAM entities for IOCs&lt;/li&gt;
&lt;li&gt; Amazon Detective now provides enhanced visualization and additional context for Amazon GuardDuty Elastic Container Service Runtime Monitoring findings
 &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  5. Amazon GuardDuty
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt; Amazon GuardDuty Introduces new machine learning capabilities to detect threats within Amazon Kubernetes Service clusters&lt;/li&gt;
&lt;li&gt; Amazon GuardDuty now supports Amazon Elastic Container Service workloads including AWS Fargate&lt;/li&gt;
&lt;li&gt; Amazon GuardDuty now supports runtime monitoring for EC2 workloads while giving visibility into operating system-level activities and container-level context into threats that are detected (Preview Feature)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;I've highlighted some of the major service announcements and feature introductions that were noteworthy. There may have been some announcements that I didn't cover in this month's announcement, therefore feel free to mention what you think was important in the comment section.&lt;/p&gt;

&lt;p&gt;Stay Tuned for the next edition of "What's New With AWS Security?"!&lt;/p&gt;

&lt;p&gt;Thank you for reading. I hope you found this useful.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
    </item>
    <item>
      <title>AWS Incident Response: How To Contain An EC2 Instance?</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Mon, 31 Oct 2022 16:10:53 +0000</pubDate>
      <link>https://dev.to/aws-builders/aws-incident-response-how-to-contain-an-ec2-instance-pjk</link>
      <guid>https://dev.to/aws-builders/aws-incident-response-how-to-contain-an-ec2-instance-pjk</guid>
      <description>&lt;h1&gt;
  
  
  Introduction
&lt;/h1&gt;

&lt;p&gt;In a world where it is a matter of "when" an incident would take place, all organizations must keep a well-thought-out plan to act upon identifying an incident that would possibly cause monetary damage as well as damage to the organization's image.&lt;/p&gt;

&lt;p&gt;The humble EC2 instance provided by AWS has quickly become one of AWS's most sought compute services. However, with its wide use, it is equally essential to ensure that administrators know the correct steps to minimize the damage when responding to an EC2 instance.&lt;/p&gt;

&lt;h1&gt;
  
  
  What Is Incident Response?
&lt;/h1&gt;

&lt;p&gt;Incident response is a structured approach that allows organizations to prepare, detect and respond to security incidents promptly while reducing the impact these incidents may have on the organization.&lt;/p&gt;

&lt;p&gt;Understanding and implementing the measures to accommodate for incident response allows organizations to have documented procedures and adequate technical controls to conduct investigations and contain the infection without allowing it to spread across the organizations.&lt;/p&gt;

&lt;p&gt;An Incident Response Plan is at the heart of any well-organized incident response as it documents the organization's procedures and responsibilities of each member within the incident response team.&lt;/p&gt;

&lt;h1&gt;
  
  
  AWS Shared Responsibility Model
&lt;/h1&gt;

&lt;p&gt;Most organizations using cloud infrastructure has a fundamental misconception that security and maintenance become the responsibility of a cloud service provider such as AWS.&lt;/p&gt;

&lt;p&gt;However, this is not true since AWS marks the responsibility boundaries of the different components that AWS and the customer are responsible for within its &lt;a href="https://aws.amazon.com/compliance/shared-responsibility-model/" rel="noopener noreferrer"&gt;shared responsibility model&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Understanding the shared responsibility model is crucial to determine the controls and responsibilities that need to be undertaken by the customer/user to manage, secure and maintain the cloud services effectively.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqdj4zjfwa47d06icimlv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqdj4zjfwa47d06icimlv.png" alt="AWS Shared Responsibility Model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Reference: &lt;a href="https://aws.amazon.com/compliance/shared-responsibility-model/" rel="noopener noreferrer"&gt;https://aws.amazon.com/compliance/shared-responsibility-model/&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;According to the AWS shared responsibility model, it is the responsibility of AWS to provide and maintain the following components:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Hardware and infrastructure running the global AWS services&lt;/li&gt;
&lt;li&gt; Software that facilitates the compute, storage, database and networking of the global AWS services&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Within the constraints of the AWS EC2 service, the shared responsibility model states that it is the responsibility of the customer/user to configure and maintain the following components:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Encryption of traffic and data&lt;/li&gt;
&lt;li&gt; Operating system, network and any firewall-related configurations&lt;/li&gt;
&lt;li&gt; Applications and IAM&lt;/li&gt;
&lt;li&gt; Data hosted on AWS and EC2 instances&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It also means that incident response and other security measures related to the operating system or any instance created on AWS must be provided and maintained by the customer.&lt;/p&gt;

&lt;h1&gt;
  
  
  Incident Response Lifecycle
&lt;/h1&gt;

&lt;p&gt;The &lt;a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf" rel="noopener noreferrer"&gt;NIST incident handling guide&lt;/a&gt; highlights the stages that must be looked at during an incident response. These stages entail the different steps necessary to protect resources from attackers and respond to an incident when a resource is compromised.&lt;/p&gt;

&lt;p&gt;The typical incident response lifecycle contains the following stages:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Planning&lt;/li&gt;
&lt;li&gt; Detection&lt;/li&gt;
&lt;li&gt; Analysis&lt;/li&gt;
&lt;li&gt; Containment&lt;/li&gt;
&lt;li&gt; Eradication&lt;/li&gt;
&lt;li&gt; Recovery&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each stage holds a vital function within the incident response lifecycle, ensuring that an organization can best prepare for an incident.&lt;/p&gt;

&lt;h2&gt;
  
  
  Stage 01: Planning
&lt;/h2&gt;

&lt;p&gt;This stage of the incident response lifecycle associates the necessary planning of documentation and other technical controls.&lt;/p&gt;

&lt;p&gt;One of the most critical documents covered during this phase is the incident response playbooks; these playbooks have step-by-step guides and responsibilities mapped out for the entire incident response team. This structured approach ensures that incident response teams are aware of their responsibilities and the approach is taken to respond to a specific type of incident such as malware infection, C2C communication, etc.&lt;/p&gt;

&lt;p&gt;This stage will also cover the planning of the necessary technical control to support the protection and incident response of the resources within an organization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Stage 02 - 03: Detection &amp;amp; Analysis
&lt;/h2&gt;

&lt;p&gt;Detection of malicious activities within the AWS infrastructure could vary depending on the type of monitoring required.&lt;/p&gt;

&lt;p&gt;A popular method of monitoring malicious activity within an EC2 instance is using a third-party EDR or XDR solution. However, this requires a separate license and other requirements set by the product manufacturer.&lt;/p&gt;

&lt;p&gt;Another popular method of gaining detailed insight into the AWS infrastructure and EC2 instances is a SIEM (Security Information and Event Management) solution that allows collecting and correlating multiple log sources to detect anomalies within the AWS resources.&lt;/p&gt;

&lt;p&gt;AWS also provides native solutions such as &lt;a href="https://aws.amazon.com/guardduty/" rel="noopener noreferrer"&gt;Amazon GuardDuty&lt;/a&gt; and &lt;a href="https://aws.amazon.com/inspector/" rel="noopener noreferrer"&gt;Amazon Inspector&lt;/a&gt; to detect and respond to threats effectively by allowing automated responses.&lt;/p&gt;

&lt;h2&gt;
  
  
  Stage 04: Containment
&lt;/h2&gt;

&lt;p&gt;Containment aims to limit the reachability of an infected resource so that it may not cause any further harm to any other resource within the AWS infrastructure.&lt;/p&gt;

&lt;p&gt;In this case, isolating an EC2 instance would provide adequate time for the incident response team to analyze and determine the scope of the infection. It also allows forensic investigators to conduct forensic analysis to determine more detailed information required during the later stages of the incident response lifecycle.&lt;/p&gt;

&lt;p&gt;The first approach that most users may take when isolating an EC2 instance is to restrict the network connectivity originating to and from the infected EC2 instance; this ensures that the attackers cannot maintain any existing backdoor communications or establish any further connections. It also ensures that no user or application has access to the infected EC2 instance that could taint any evidence within the EC2 instance or allow it to infect other resources within the AWS infrastructure further.&lt;/p&gt;

&lt;p&gt;This article focuses on exploring the different approaches to isolating an EC2 instance.&lt;/p&gt;

&lt;h1&gt;
  
  
  How to contain an EC2 instance?
&lt;/h1&gt;

&lt;p&gt;Users can use multiple approaches when isolating an EC2 instance. The approach used will depend on the level of isolation required.&lt;/p&gt;

&lt;p&gt;The most common methods of isolation are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Security Groups&lt;/li&gt;
&lt;li&gt; NACLs&lt;/li&gt;
&lt;li&gt; Route Tables&lt;/li&gt;
&lt;li&gt; Internet Gateways&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Containing an EC2 Using Security Groups
&lt;/h2&gt;

&lt;p&gt;Security groups are often the most common approach when isolating an EC2 instance due to their ease of use and targeting isolation capabilities.&lt;/p&gt;

&lt;p&gt;A security group's default "implicit deny" behaviour makes it a suitable isolation method since a security group without rules will deny all traffic; a security group requires a user to specify rules to allow specific traffic.&lt;/p&gt;

&lt;p&gt;However, it is essential to note that adding a security group to an EC2 instance will not restrict traffic, and AWS will grant access to the security group with the most permissive rules.&lt;/p&gt;

&lt;p&gt;Therefore to restrict access by using a security group, users must remove all existing security groups from an EC2 instance or remove all the rules from the existing security group.&lt;/p&gt;

&lt;p&gt;When using security groups for isolation, it is crucial to consider the connections an EC2 instance may establish via a security group. These types of connections are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Untracked Connections&lt;/li&gt;
&lt;li&gt; Tracked Connections&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Untracked Connections
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html" rel="noopener noreferrer"&gt;Untracked connections&lt;/a&gt; are any connection established from a rule with a "0.0.0.0/0" wildcard. The direction of these connections can be both inbound and outbound.&lt;/p&gt;

&lt;p&gt;The significance of these types of connections is that any change to a security group, such as a rule change or security group change, will immediately affect the traffic flow.&lt;/p&gt;

&lt;h3&gt;
  
  
  Tracked Connections
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-connection-tracking.html" rel="noopener noreferrer"&gt;Tracked connections&lt;/a&gt; are any connection established from a rule with a specific IP address or segment, such as rules that allow traffic from "43.101.53.202/32". The direction of these connections can be both inbound and outbound.&lt;/p&gt;

&lt;p&gt;Unlike untracked connections, changing a rule within a security group or deleting a security group from an EC2 instance will not immediately affect the traffic flow. This property of tracked connections may allow an attacker to maintain established connections even after the specific rules are removed.&lt;/p&gt;

&lt;h3&gt;
  
  
  Isolating EC2 instances with Tracked Connections
&lt;/h3&gt;

&lt;p&gt;Users must follow the steps mentioned below to isolate an EC2 instance with a tracked connection:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Create a dedicated isolation security group without any rules&lt;/li&gt;
&lt;li&gt; Create a single rule of 0.0.0.0/0 for all traffic in both the inbound and outbound rules&lt;/li&gt;
&lt;li&gt; Remove any existing security groups attached to the EC2 instance&lt;/li&gt;
&lt;li&gt; Associate the newly created isolation security group to the instance&lt;/li&gt;
&lt;li&gt; Delete both the inbound and outbound rules you created for the isolation security group&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Following these steps will effectively convert all the existing tracked connections into untracked connections, thus terminating any existing connections.&lt;/p&gt;

&lt;h3&gt;
  
  
  Planning Ahead With Security Groups
&lt;/h3&gt;

&lt;p&gt;Each second could be the difference between successful isolation or further infection in a time-sensitive operation such as an incident response. Therefore users may keep preconfigured security groups that can be used to perform EC2 isolation.&lt;/p&gt;

&lt;p&gt;a. Create a “Step 01” security group with the following rules&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg66fx76egu05h3zwuq65.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg66fx76egu05h3zwuq65.png" alt="Step 01 Security Group"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;b. Create a "Step 02" security group without any rules&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjdpehmki3gxvp09p06hw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjdpehmki3gxvp09p06hw.png" alt="Step 02 Security Group"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After creating these two security groups, users will now be able to swiftly isolate an EC2 instance while eliminating any tracked connections by using the following steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Remove all existing security groups or rules within existing security groups&lt;/li&gt;
&lt;li&gt; Add the “Step 1” security group to the EC2 instance&lt;/li&gt;
&lt;li&gt; Remove the “Step 1” security group from the EC2 instance&lt;/li&gt;
&lt;li&gt; Associate the “Step 2” security group to the EC2 instance&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Containing an EC2 Using NACLs
&lt;/h2&gt;

&lt;p&gt;NACLs or Network ACLs is the next approach users may use to isolate an EC2 instance. However, NACLs are not targeted; therefore, it is difficult to isolate an individual EC2 instance using an NACL.&lt;/p&gt;

&lt;p&gt;A Network ACL relies on rules to allow and deny traffic from subnets; however, unlike security groups, NACLs are stateless, meaning that rules need to be defined for both the request and the response of each connection.&lt;/p&gt;

&lt;p&gt;The most significant advantage of using a NACL is that there is no multistage process compared to a security group. A single inbound or outbound rule will deny all traffic towards the respective direction.&lt;/p&gt;

&lt;p&gt;However, since NACLs rely on rules based on subnets. Therefore, using NACLs to isolate an EC2 instance will affect all the other instances within the specified subnet.&lt;/p&gt;

&lt;p&gt;Users may choose to use an existing NACL for isolation. In this method, users are required to add the deny rule as the first rule of the NACL; if the NACL is full existing rules may need to be removed to make space for the isolation-specific rules at the top of the NACL.&lt;/p&gt;

&lt;p&gt;The other approach is to create a new NACL with the deny rules at the start of the NACL and to associate the dedicated isolation NACL to the VPC that hosts the affected EC2 instance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Containing an EC2 Using Route Tables
&lt;/h2&gt;

&lt;p&gt;Users can use route tables to isolate EC2 instances to move up the isolation spectrum. Route tables are an excellent method of isolating EC2 instances from all external networks, such as Internet Gateways, Direct Connections and VPN connections.&lt;/p&gt;

&lt;p&gt;However, it is essential to understand that the route table is associated with the VPC that hosts the EC2 instance and not the EC2 instance itself. Therefore even though using a route table for isolation terminates all connections to all external networks, it will also disrupt any connection flowing through the specific VPC.&lt;/p&gt;

&lt;p&gt;Additionally, isolating EC2 instances using route tables will restrict external access to the affected EC2 instance. However, it will still be able to communicate within the subnet and continue to spread to other resources within the same subnet.&lt;/p&gt;

&lt;h2&gt;
  
  
  Containing EC2 Using Internet Gateways
&lt;/h2&gt;

&lt;p&gt;EC2 Isolation using internet gateways restricts internet connectivity to the VPCs that host the EC2 instances. However, restricting access using internet gateways are not straightforward since AWS will not allow users to remove the internet gateways if any EC2 dependencies within the VPC require the internet gateway.&lt;/p&gt;

&lt;p&gt;Users are required to remove all dependencies to isolate an EC2 instance using an internet gateway successfully. However, this is not feasible during an incident response scenario.&lt;/p&gt;

&lt;p&gt;Instead, users may obtain the same effect by removing all the internet gateway routes from the routing table or attaching a custom route table with no rules for all subnets.&lt;/p&gt;

&lt;h1&gt;
  
  
  EC2 Containment Playbook
&lt;/h1&gt;

&lt;p&gt;A well-balanced and practical incident response playbook must cover all possible aspects when containing an affected resource. It must not restrict itself to a network containment approach but explore all possible methods of limiting access to and from the affected EC2 instance.&lt;/p&gt;

&lt;p&gt;The following playbook provides a good starting point for organizations to adopt an EC2 containment playbook that covers most basic containment areas.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Tag and detach the EC2 instance from any auto-scaling group&lt;/li&gt;
&lt;li&gt; Create a new security group that denies both inbound and outbound traffic (Empty Security Group)&lt;/li&gt;
&lt;li&gt; Remove any existing security groups and associate them with the “empty” security group&lt;/li&gt;
&lt;li&gt; Remove any IAM roles associated with the instance&lt;/li&gt;
&lt;li&gt; Create a snapshot of the root volume&lt;/li&gt;
&lt;li&gt; Create an AMI (Amazon Machine Image) of the instance for later analysis&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It is also important to tag all entities used for isolation so that the same resources will not be used for any other business operation that can render the isolation ineffective.&lt;/p&gt;

&lt;h1&gt;
  
  
  Key Takeaways
&lt;/h1&gt;

&lt;p&gt;This article explains the various approaches available for EC2 instance isolation. However, using a single method for isolation may not be sufficient since other factors may force a user to select a combination of these isolation approaches.&lt;/p&gt;

&lt;p&gt;Additionally, network containment is only one part of a comprehensive isolation plan. Therefore, users must isolate other aspects, such as additional roles, to ensure comprehensive isolation.&lt;/p&gt;

&lt;p&gt;I hope you have found this helpful. Thank you for reading!&lt;/p&gt;

</description>
      <category>security</category>
      <category>aws</category>
      <category>cloud</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Everything You Need To Get Started With AWS IAM</title>
      <dc:creator>Lahiru Hewawasam</dc:creator>
      <pubDate>Sun, 09 Oct 2022 15:06:58 +0000</pubDate>
      <link>https://dev.to/aws-builders/everything-you-need-to-get-started-with-aws-iam-511d</link>
      <guid>https://dev.to/aws-builders/everything-you-need-to-get-started-with-aws-iam-511d</guid>
      <description>&lt;h2&gt;
  
  
  What is IAM on AWS?
&lt;/h2&gt;

&lt;p&gt;Identity and access management is one of AWS's most essential services. IAM lays the foundation for solid identity management, allowing granular access to entities within AWS.&lt;/p&gt;

&lt;p&gt;IAM within AWS splits into two main components:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;Identities&lt;/strong&gt; - Takes care of identifying a user within an AWS account. It is essential to understand that AWS requires a unique value for each account, represented by a 12-digit account ID or a unique account alias. Within each AWS account, administrators are only allowed to create 5000 users per AWS account, and each username must be distinctive from one another.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Access Management&lt;/strong&gt; - Assigns and manages access to the level of access granted to a specific resource within AWS.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  IAM Features
&lt;/h2&gt;

&lt;p&gt;AWS IAM provides various features that allow administrators to manage users and access the AWS account.&lt;/p&gt;

&lt;p&gt;There are some key IAM components that every administrator must be familiar with:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;Users&lt;/strong&gt; - Individual users created within an AWS account&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;User Groups&lt;/strong&gt; - A collection of IAM users; used to specify permissions to a collection of IAM users&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Roles&lt;/strong&gt; - A short-lived credential with specific permissions that entities can assume to gain access&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Policies&lt;/strong&gt; - Object that defined specific permissions within AWS&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Identity Providers&lt;/strong&gt; - Enables administrators to use SAML 2.0 or OpenID connect to integrate a third-party directory service.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Creating and Managing Users on AWS IAM
&lt;/h2&gt;

&lt;p&gt;One of the first steps when configuring an AWS account is to create users within IAM that can be accessed instead of the default root account.&lt;/p&gt;

&lt;p&gt;An administrator may specify a unique user name for each user created; however, it is essential to remember the user name contains a 64-character limit.&lt;/p&gt;

&lt;p&gt;Next, the administrator must specify the access type for the method of access for each IAM user:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;Access Key&lt;/strong&gt; - Grants programmatic access to the user via AWS API, CLI, SDK, etc.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Password&lt;/strong&gt; - Grants AWS management console access to the user&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bDSxuMxN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/693cv9g354qdfp0yl0fc.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bDSxuMxN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/693cv9g354qdfp0yl0fc.PNG" alt="AWS IAM - Create User" width="880" height="714"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once the required access is selected, the following steps require the necessary permissions for the user. There are multiple methods for granting access to a user, such as adding a user to an existing user group, copying permissions from a current user or attaching a policy directly. However, it is best practice to grant users access by adding them to a user group since it is easily scaled and managed.&lt;/p&gt;

&lt;p&gt;Additionally, administrators may specify permission boundaries to restrict the maximum user permissions allowed for a specific user; this prevents unnecessary and overly permissive policies from being granted to a user.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--97JIdHNu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/doiq5c7bj2aetj3ya6zz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--97JIdHNu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/doiq5c7bj2aetj3ya6zz.png" alt="AWS IAM - Create User" width="880" height="598"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After completing this step, the administrator may choose to assign &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_tags_users.html"&gt;tags&lt;/a&gt;. These tags can help further organize, track and control access.&lt;/p&gt;

&lt;p&gt;After completing these steps, the administrator may decide to create the user by reviewing the defined parameters and confirming the action.&lt;/p&gt;

&lt;h2&gt;
  
  
  Managing Access with IAM User Groups &amp;amp; Roles
&lt;/h2&gt;

&lt;p&gt;One of the best practices used to manage access within IAM is by using user groups and roles. User groups enable administrators to easily control access at scale without manually assigning multiple permissions to a single user.&lt;/p&gt;

&lt;p&gt;AWS user groups are a collection of IAM users that require specific access, such as Full access to an S3 bucket. In this instance, the administrator may assign the required policy to the user group and add the users to the user group to gain Full access to the S3 bucket.&lt;/p&gt;

&lt;p&gt;However, user groups have default limitations; therefore, it is crucial that administrators plan accordingly and do not exceed these limits:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Maximum of 300 groups per AWS account

&lt;ul&gt;
&lt;li&gt;To increase this limit, you'll need to contact AWS support&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt; A user can only be associated with ten user groups&lt;/li&gt;
&lt;li&gt; Each user group may only contain ten different policies attached at once&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Unlike permissions granted via policies and user groups, IAM roles are issues temporarily. It allows users to assume temporary roles to perform a specific task they would not have been granted access to within their user groups; they can also grant access to users to access services from a different AWS account.&lt;/p&gt;

&lt;p&gt;Considering the functionality of the IAM roles, the following entities may use this function:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; User in the AWS account&lt;/li&gt;
&lt;li&gt; User in a different AWS account&lt;/li&gt;
&lt;li&gt; AWS service&lt;/li&gt;
&lt;li&gt; Externally federated AWS user account&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Managing Permissions using IAM Policies
&lt;/h2&gt;

&lt;p&gt;Policies are the foundation of enabling access within AWS IAM and will be used to grant and even limit the maximum access for a specific entity.&lt;/p&gt;

&lt;p&gt;There are four policy categories used within AWS IAM:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Identity-based policies&lt;/li&gt;
&lt;li&gt; Resource-based policies&lt;/li&gt;
&lt;li&gt; Permission boundaries&lt;/li&gt;
&lt;li&gt; Service control policies&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Identity-based policies
&lt;/h3&gt;

&lt;p&gt;These policies can be attached to users, user groups or roles within AWS IAM to control each entity's access.&lt;/p&gt;

&lt;p&gt;Identity-based policies have two different types:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Managed policies&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; These policies are stored within the AWS policy library and can be assigned to multiple users, user groups and roles&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Inline Policies&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; These policies are not stored within the AWS policy library. However, they can be assigned to a single user, user group or role. These policies cannot be shared amongst entities.&lt;/li&gt;
&lt;li&gt; Using inline policies is not considered best practice since they scale well and must only be used if necessary.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Managed policies are further separated into two categories:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Managed Policies&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;These policies are predefined by AWS and are available for standard permissions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Customer Managed Policies&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;These policies are defined by the administrator and saved within the AWS policy library to grant custom permissions&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Resource-based policies
&lt;/h3&gt;

&lt;p&gt;These policies are effectively inline policies associated with a resource rather than an identity. For example, resource-based policies grant principles permissions so they can access a particular resource such as AWS S3.&lt;/p&gt;

&lt;p&gt;The difference between an identity-based and resource-based policy is that it does not have the "principle" parameter within the policy as it is associated with an identity. On the other hand, resource-based policies must have the "principle" parameter to specify which identity the policy permissions apply.&lt;/p&gt;

&lt;h3&gt;
  
  
  Permission boundaries
&lt;/h3&gt;

&lt;p&gt;Permission boundaries differ from identity-based and resource-based policies, as permission boundaries do not grant permissions. However, they restrict the maximum permission level for a specific user or role.&lt;/p&gt;

&lt;p&gt;These policies can be attached to a user or role but cannot be linked to user groups within IAM. These policies can be AWS-managed policies or customer-managed policies.&lt;/p&gt;

&lt;p&gt;These policies build a fence for the maximum permissions granted for a user or role, ensuring that these entities do not obtain excessively permissive access.&lt;/p&gt;

&lt;h3&gt;
  
  
  Service control policies
&lt;/h3&gt;

&lt;p&gt;These policies are similar to permission boundaries as they define the maximum level of permissions allowed. However, organization service control policies or SCPs, such as AWS accounts or Organizational Units (OUs), restrict access at a much larger scale.&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Policy Generator
&lt;/h2&gt;

&lt;p&gt;The &lt;a href="https://awspolicygen.s3.amazonaws.com/policygen.html"&gt;AWS policy generator&lt;/a&gt; is a quick and easy method to create and define your AWS policies rather than writing all the policies from scratch.&lt;/p&gt;

&lt;p&gt;Instead, when creating the new IAM policy, you can use the graphical interface to select the necessary permissions and services that need access and transfer the compiled policy into the AWS IAM console.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DwtaEbsO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5qf3ljxc517toe4idij8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DwtaEbsO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5qf3ljxc517toe4idij8.png" alt="AWS Policy Generator" width="880" height="627"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "Stmt1665324279615",
      "Action": "s3:*",
      "Effect": "Allow",
      "Resource": "arn:aws:s3:::firsts####"
    }
  ]
}

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Identity Federation with AWS IAM
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/identity/federation/"&gt;Identity federation&lt;/a&gt; within AWS IAM supports two types of federation:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Web ID federation

&lt;ul&gt;
&lt;li&gt;Supports OpenID Connect providers such as Google, Facebook, Amazon, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt; SAML 2.0-based federation&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;AWS allows users and accounts from third-party identity providers such as Microsoft Active Directory to use AWS services with the federation. In addition, it will enable organizations that already use identity providers to use the same accounts to grant access to AWS services, thus cutting down the requirement of users needing to have separate AWS IAM accounts.&lt;/p&gt;

&lt;p&gt;It also allows you to create seamless single sign-on capabilities within the organization to improve the user experience.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;AWS IAM is an integral part of the AWS services and builds the foundational blocks for all user and access management.&lt;/p&gt;

&lt;p&gt;This article covered the basics required to understand key features that will allow administrators and users to start their AWS journey.&lt;/p&gt;

&lt;p&gt;I hope you have found this helpful. Thank you for reading!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>identity</category>
      <category>access</category>
      <category>iam</category>
    </item>
  </channel>
</rss>
