menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cloud News

>

AWS re:Inf...
source image

AWS Blogs

2w

read

203

img
dot

Image Credit: AWS Blogs

AWS re:Inforce roundup 2025: top announcements

  • AWS re:Inforce 2025 featured new security innovations and capabilities announced by AWS Vice President and Chief Information Security Officer Amy Herzog.
  • A new IAM Access Analyzer capability helps verify internal access to critical AWS resources like S3 buckets, DynamoDB tables, and RDS snapshots.
  • AWS now enforces Multi-Factor Authentication (MFA) for root users across all account types to prevent password-related attacks.
  • Amazon threat intelligence on AWS Network Firewall offers protection against active threats relevant to workloads in AWS.
  • AWS Certificate Manager now allows the issuance of exportable public SSL/TLS certificates for secure traffic termination.
  • The new AWS WAF console simplifies security configuration steps by providing pre-configured protection packs for specific application types.
  • Amazon CloudFront introduces a user-friendly interface to simplify web application delivery and security configuration.
  • AWS Shield features Shield network security posture management for discovering and analyzing network security issues.
  • AWS Security Hub enhances risk prioritization and response at scale to transform security signals into actionable insights.
  • Amazon GuardDuty Extended Threat Detection now supports Amazon EKS clusters, improving detection of multistage attacks.
  • The AWS MSSP Competency introduces new categories for partners providing security services, covering various security domains.
  • Amazon Verified Permissions offers an open-source toolkit for securing Express application APIs in minutes.
  • Amazon Inspector code security capabilities help identify security vulnerabilities across application source code, dependencies, and infrastructure.
  • AWS Backup adds Multi-party approval for logically air-gapped vaults to enhance data recovery even in compromised account scenarios.

Read Full Article

like

12 Likes

For uninterrupted reading, download the app