Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Amazon Web Services

Amazon Web Service (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of simple, abstract technical infrastructure and distributed computing building blocks and tools.

AWS comprises more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Computer Cloud (EC2) and Amazon Simple Storage Service (Amazon S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.

Our Website:

Latest Content From Amazon Web Services

Webcast: How to Perform Security Investigations in AWS

by Amazon Web ServicesDec 10, 2019

Learn how to plan for a cloud-based security investigation, perform prerequisites, and select services and controls. Know what data sources to leverage when investigating and containing an incident in the cloud, how to determine source and timeline, targeted systems, origination point and more.

Webcast: How to Build a Threat Hunting Program in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat hunting program for your AWS environment, including tools and techniques for discovery and analysis. Know where to search for valuable data in logs and elsewhere, how to efficiently analyze that data using native AWS capabilities and how to enrich your findings through SIEM and SOAR technologies.

Webcast: How to Build a Threat Detection Strategy in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat detection strategy and how to enhance visibility for continuous monitoring, detection and event management in the AWS. Know how to streamline Detection and Response with key design considerations, needs and capabilities, as well as technical, business and operational requirements.

Webcast: How to Secure Application Pipelines in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to improve and automate security across the continuous integration/continuous deployment (CI/CD) pipeline. Know how and where security ties into all stages of cloud-oriented development pipeline when leveraging DevOps practices and deploying containers and microservers.

Webcast: How to Build an Endpoint Security Strategy in AWS

by Amazon Web ServicesDec 11, 2019

Learn the key elements of a defense-in-depth architecture to create a readily deployable, fully integrated endpoint security strategy in AWS. Know how to implement effective strategies and gain comprehensive visibility with integrated EDR, UBA, DLP, threat intelligence and machine learning.

Whitepaper: Building an Endpoint Security Strategy in AWS

by Amazon Web ServicesDec 13, 2019

Gain visibility into your endpoints, current threat intelligence, compliance status, and more by leveraging AWS services and solutions in AWS Marketplace.

Whitepaper: How to Build a Threat Detection Strategy in Amazon Web Services (AWS)

by Amazon Web ServicesDec 13, 2019

One major concern security teams have is losing visibility and detection capabilities when their organization moves to a cloud. While this might have been true in the early days of cloud services, these days providers are announcing new threat detection features and offerings almost every month. These new services open up the possibility of adjusting traditional network- and host-based monitoring to support intrusion detection in the cloud. In this paper, we focus on the key steps to detect threats in Amazon Web Services (AWS) and gradually build a security monitoring strategy.

Whitepaper: Enabling a Threat Hunting Capability in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct effective threat hunting in your Amazon Web Services (AWS) environment.

Whitepaper: Enabling a Security Investigation in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct an effective investigation in your Amazon Web Services (AWS) environment

Whitepaper: How to Secure App Pipelines in AWS

by Amazon Web ServicesDec 13, 2019

We are seeing nothing less than an evolutionary shift as security infrastructure moves to software-defined models that improve speed and scale, and afford enterprise IT more agility and capabilities than ever before. Application development and deployment are driving this shift, and as the pace of development increases, organizations have a real need to ensure application security is embedded in all phases of the development and deployment life cycle, as well as in the cloud during operations.