June 14, 2023, 11:26 a.m. | Eyal Estrin

DEV Community dev.to




Security of the Cloud











Security in the Cloud





What are AWS Verified Access?


https://docs.aws.amazon.com/verified-access/latest/ug/what-is-verified-access.html







Announcement: AWS Verified Permissions


Purpose: Manage permissions and fine-grained authorization in applications that you build


References:








Announcement: Amazon EC2 Instance Connect Endpoint


Purpose: Allows to connect to an instance via SSH or RDP without requiring the instance to have a public IPv4 address


References:








Announcement: Amazon Inspector Code Scan for Lambda


Purpose: Scans custom proprietary application code within a Lambda function …

access amazon announcement applications authorization aws aws re:inforce build cloud cloud security connect ec2 endpoint instance ipv4 keynote manage permissions public rdp re:inforce re:inforce 2023 security ssh verified

IT Security Manager

@ Timocom GmbH | Erkrath, Germany

Cybersecurity Service Engineer

@ Motorola Solutions | Singapore, Singapore

Sr Cybersecurity Vulnerability Specialist

@ Health Care Service Corporation | Chicago Illinois HQ (300 E. Randolph Street)

Associate, Info Security (SOC) analyst

@ Evolent | Pune

Public Cloud Development Security and Operations (DevSecOps) Manager

@ Danske Bank | Copenhagen K, Denmark

Cybersecurity Risk Analyst IV

@ Computer Task Group, Inc | United States