The Ops Community ⚙️

Cover image for AWS re:Inforce 2023 keynote highlights
Eyal Estrin
Eyal Estrin

Posted on • Originally published at eyal-estrin.Medium

AWS re:Inforce 2023 keynote highlights

Security of the Cloud

Image description

Image description

Image description

Image description

Image description

Image description

Security in the Cloud

Image description

Image description

Image description

What are AWS Verified Access?

https://docs.aws.amazon.com/verified-access/latest/ug/what-is-verified-access.html

Image description

Image description

Announcement: AWS Verified Permissions

Purpose: Manage permissions and fine-grained authorization in applications that you build

References:

Image description

Image description

Announcement: Amazon EC2 Instance Connect Endpoint

Purpose: Allows to connect to an instance via SSH or RDP without requiring the instance to have a public IPv4 address

References:

Image description

Image description

Announcement: Amazon Inspector Code Scan for Lambda

Purpose: Scans custom proprietary application code within a Lambda function for code security vulnerabilities such as injection flaws, data leaks, weak cryptography, or missing encryption based on AWS security best practices

References:

Image description

Announcement: Amazon Inspector SBOM Export

Purpose: Offers the ability to export a consolidated Software Bill of Materials (SBOMs) for all Amazon Inspector monitored resources across organization in industry standard formats

References:

Image description

Image description

Announcement: Amazon CodeGuru Security

Purpose: A static application security testing (SAST) tool that uses Machine Learning to help identify code vulnerabilities and provide guidance to use as part of remediation

Note: This service is currently in preview

References:

Image description

Image description

Announcement: Findings Groups for Amazon Detective

Purpose: Amazon Detective has expanded finding groups to include Amazon Inspector network reachability and software vulnerability findings alongside Amazon GuardDuty findings

References:

Image description

Image description

About the Author

Eyal Estrin is a cloud and information security architect, the owner of the blog Security & Cloud 24/7 and the author of the book Cloud Security Handbook, with more than 20 years in the IT industry.
You can connect with him on Twitter and LinkedIn.

Top comments (0)