AWS Storage Blog
Tag: AWS Identity and Access Management (IAM)
Using job tags to manage permissions for Amazon S3 Batch Operations jobs
As organizations grow their use of AWS, they often find that a variety of teams and applications begin to use the data stored in Amazon S3. While customers love the agility benefits of this, they also seek to govern their data’s security, productivity, and cost. Earlier this year we announced support for job tags with […]
Automating copying encrypted Amazon EBS snapshots across AWS accounts
UPDATE: The screenshots of the Amazon DLM interface in this post were updated on 7/14/2021. Many customers have disaster recovery (DR) best practices that require them to copy their Amazon EBS snapshots to an isolated account in a different Region and encrypt those snapshots with a different key. In doing so, customers are able to […]
How Discover Financial secures file transfers with AWS Transfer Family
Discover Financial Services (NYSE: DFS) is a digital banking and payment services company with one of the most recognizable brands in US financial services. Since its inception in 1986, Discover has become one of the largest card issuers in the United States. We are proud members of the platform team at Discover, where we are […]
AWS Identity and Access Management on AWS Snowball Edge
Many of our customers use AWS Snowball Edge devices for secure data transfer and edge computing applications. Recently, AWS announced support for AWS Identity and Access Management (IAM) on Snowball Edge. Before the introduction of IAM on Snowball Edge, IT administrators shared a single access key/secret key combination with all the users who wanted to […]
Monitor data transfer costs related to Amazon S3 Replication
UPDATE (2/10/2022): Amazon S3 Batch Replication launched on 2/8/2022, allowing you to replicate existing S3 objects and synchronize your S3 buckets. See the S3 User Guide for additional details. In this post, we will review how to monitor the cost and usage details of Amazon S3 Replication for use-cases such as compliance, disaster recovery, or […]