Elastic Cloud Hosted deployments that have been encrypted with AWS KMS keys also support AWS KMS key security policies and features, such as key rotation and key revocation. Key rotation minimizes the risk of data leaks due to key compromise. Key revocation is an additional security measure, where access to encrypted data via a compromised key is terminated, either via … [Read more...] about Encryption at rest in Elastic Cloud: Bring your own key with AWS KMS
aws
Cisco Simplifies Cloud Security with AWS Cloud WAN Service Insertion
In conversations with customers about cloud infrastructure, I routinely hear two challenges when it comes to scaling their cloud deployments, these challenges include: Achieving secure connectivity across clouds, virtual private clouds (VPCs), regions, and on-premises networks Ensuring security is baked into the network architecture from the start. As customers grow their … [Read more...] about Cisco Simplifies Cloud Security with AWS Cloud WAN Service Insertion
Elastic and AWS deliver on AI-driven security analytics
The release and timing of any features or functionality described in this post remain at Elastic's sole discretion. Any features or functionality not currently available may not be delivered on time or at all.In this blog post, we may have used or referred to third party generative AI tools, which are owned and operated by their respective owners. Elastic does not have any … [Read more...] about Elastic and AWS deliver on AI-driven security analytics
5 Best Practices to Secure AWS Resources
Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps businesses drive growth and innovation. However, as organizations migrate to the cloud, they face a complex and growing threat … [Read more...] about 5 Best Practices to Secure AWS Resources
Financial sector operational excellence with Elasticsearch on AWS
In the dynamic landscape of financial services, data is not just currency; it's the key to innovation and operational excellence. Data is constantly streamlining from devices, logins, transfers, transactions, and much more, and it’s bound to increase with an ongoing reliance on digital channels. This creates a massive opportunity and responsibility for financial institutions, … [Read more...] about Financial sector operational excellence with Elasticsearch on AWS
That’s a wrap! Looking back on the Elastic and AWS collaboration in 2023
What a fantastic week at Amazon Web Services (AWS) re:Invent 2023! As a Diamond sponsor, we thoroughly enjoyed supporting our partner AWS at this flagship event and conversing with so many individuals from around the world who are interested in Elastic®.On the heels of the event and with the holiday season upon us, we thought now would be a great time to share a blog post … [Read more...] about That’s a wrap! Looking back on the Elastic and AWS collaboration in 2023
Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct follow-on attacks. The service enables threat actors to impersonate user identities and roles in cloud environments, Red Canary researchers Thomas Gardner and Cody Betsworth said in a … [Read more...] about Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent
CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. We are also proud to be a launch partner for AWS Built-in and achieve two AWS competencies. These accomplishments demonstrate our forward-thinking approach to cloud security … [Read more...] about CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent
Falcon and Red Hat OpenShift Service on AWS (ROSA)
As organizations increasingly deploy business-critical workloads to managed cloud services, enforcing strong security practices needs to be a top priority. While many managed cloud service providers do a good job of protecting the cloud and infrastructure itself, it’s the responsibility of the customer to protect what’s running inside the cloud. This is commonly known as the … [Read more...] about Falcon and Red Hat OpenShift Service on AWS (ROSA)
Secure your Elastic Cloud deployment with AWS PrivateLink traffic filter
Traffic filters consist of rule(s) that specify the source of traffic, such as IP/CIDR or AWS VPC endpoint, and rule sets, which are a set of traffic filter rules. Rule sets are then associated with the deployment and can restrict access to the deployment based on those rules.By default, customers connect to deployment over the public internet. Customers can assign multiple … [Read more...] about Secure your Elastic Cloud deployment with AWS PrivateLink traffic filter