AWS Security Blog
Category: Featured
Secure your Express application APIs in minutes with Amazon Verified Permissions
June 23, 2025: We updated @verifiedpermissions/authorization-clients to @verifiedpermissions/authorization-clients-js to correctly reflect the name of the package on npm. Today, Amazon Verified Permissions announced the release of @verifiedpermissions/authorization-clients-js, an open source package that developers can use to implement external fine-grained authorization for Express.js web application APIs in minutes when using Verified Permissions. Express is a minimal […]
Improve your security posture using Amazon threat intelligence on AWS Network Firewall
Today, customers use AWS Network Firewall to safeguard their workloads against common security threats. However, they often have to rely on third-party threat feeds and scanners that have limited visibility in AWS workloads to protect against active threats. A self-managed approach to cloud security through traditional threat intelligence feeds and custom rules can result in […]
Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities
Since launch, Amazon Inspector has helped customers automate vulnerability management for their running workloads on Amazon Elastic Compute Cloud (Amazon EC2), container workloads, and AWS Lambda functions. Today, we’re taking a step forward into more proactive security with the latest addition to Amazon Inspector: code security capabilities. By using this powerful new feature you can […]
From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic
AWS Network Firewall’s automated domain lists feature enhances network security by analyzing HTTP and HTTPS traffic patterns, providing visibility into domain usage, and simplifying the creation and management of outbound traffic controls through domain-based allowlisting.
Introducing the AWS Trust Center
We’re launching the AWS Trust Center, a new online resource that shares how we approach securing your assets in the cloud. The AWS Trust Center is a window into our security practices, compliance programs, and data protection controls that demonstrates how we work to earn your trust every day.
CCN releases guide for Spain’s ENS landing zones using Landing Zone Accelerator on AWS
The Spanish National Cryptologic Center (CCN) has published a new STIC guide (CCN-STIC-887 Anexo A) that provides a comprehensive template and supporting artifacts for implementing landing zones that comply with Spain’s National Security Framework (ENS) Royal Decree 311/2022 using the Landing Zone Accelerator on AWS.
Strengthening security in the era of generative AI: Must-attend sessions at re:Invent 2024
Secure generative AI insights await at AWS re:Invent 2024; gain practical strategies to harness AI’s power while safeguarding data and compliance from leading experts through immersive sessions tailored for security professionals and AI/ML builders.
Hardening the RAG chatbot architecture powered by Amazon Bedrock: Blueprint for secure design and anti-pattern mitigation
Mitigate risks like data exposure, model exploits, and ethical lapses when deploying Amazon Bedrock chatbots. Implement guardrails, encryption, access controls, and governance frameworks.
How to securely transfer files with presigned URLs
Securely share sensitive data with time-limited, nonce-enhanced presigned URLs that prevent replay attacks, minimizing exposure risks through granular access controls and rigorous monitoring.
A sneak peek at the data protection sessions for re:Inforce 2024
Gain deep insights into securing data across AWS services at AWS re:Inforce 2024, with sessions covering encryption, compliance, healthcare AI, and more, from industry leaders like United Airlines and Fannie Mae.