SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news
Story image

AWS makes building and securing data lakes easier

FYI, this story is more than a year old

Amazon Web Services (AWS) has announced three new services that provide automation and prescriptive guidance to help customers build more quickly on AWS.

AWS Control Tower gives customers an automated “landing zone” that makes it easy to set up their multi-account environment and continuously govern their AWS workloads with rules for security, operations, and compliance.

AWS Security Hub is a central place to manage security and compliance across an AWS environment so that customers can quickly see their AWS security and compliance state in one comprehensive view.

AWS Lake Formation makes it easier for customers to build a secure data lake by simplifying and automating many of the complex manual steps usually required, including collecting, cleaning, and Catalogueing data.

As the cloud has increasingly become the default choice for organisations, it has attracted two distinct types of builders.

The first group are the tinkerers who want to use the full range of AWS services, pick out various building blocks, and hammer them together to create a specific architecture.

The second type of builders are willing to trade some of the service granularity to start at a higher abstraction layer where much of the construction has already been done for them and they can get started faster.

AWS caters to customers who want to build from the ground up, while also adding services over time like AWS Elastic Beanstalk, Amazon Lightsail, and Amazon SageMaker that are designed to serve the needs of this second type of builder.

AWS Control Tower, AWS Security Hub, and AWS Lake Formation extend this approach to a wider array of workloads and scenarios, giving customers abstracted services to help with provisioning and governance, monitoring security and compliance, and building and managing data lakes.

These services automate multi-step processes to get customers up and running more quickly, while also centralising management of crucial elements of their AWS environment, helping maintain consistency and providing more complete visibility.

“Our customers want us to package our services in ways that make it easier for them to build an architecture quickly,” says AWS senior vice president Charlie Bell.

“One of the central benefits of the cloud is that it removes the vast operational complexities of managing physical infrastructure.

“AWS's new services abstract away additional complexity, speeding and simplifying the process of deploying and managing cloud workloads, so customers can build faster, operate more securely, and maintain consistent governance in a way that gives them more time to innovate.

AWS Control Tower makes it easy to set up and govern a secure, compliant multi-account environment

Enterprises migrating to AWS often need to manage a large number of accounts, distributed teams, and applications.

AWS's provisioning and management services give customers granular control over their environments, but many organisations also want prescriptive guidance and help setting up a secure, multi-account environment.

They want to make sure both that they're using all the right tools and that they understand how those tools can be used to create and enforce policies for their teams to deploy workloads in a secure and compliant way.

And they want all of this without sacrificing the speed and agility of AWS.

AWS Control Tower addresses these challenges by providing central cloud teams with a single, automated “landing zone” where their teams can provision accounts and workloads according to industry and AWS best practices.

The automated landing zone employs best-practices blueprints, such as configuring a multi-account structure using AWS Organisations, managing user identities and federated access with AWS Single Sign-on or Microsoft Active Directory, configuring an account factory through AWS Service Catalogue, centralising a log archive using AWS CloudTrail and AWS Config, and more.

AWS Control Tower offers pre-packaged governance rules for security, operations, and compliance, which customers can apply enterprise-wide or to groups of accounts to enforce policies or detect violations.

All of this can be easily managed and monitored through AWS Control Tower's dashboard, providing customers with centralized visibility into a customer's AWS environment including information such as accounts provisioned, preventive and detective guardrails enabled, and the compliance status of accounts as it relates to the guardrails.

AWS Security Hub provides centralised management for security and compliance 

Enterprises today use a broad array of AWS and third-party security tools that are continuously generating findings viewable in multiple consoles and dashboards.

To understand their overall security and compliance state, customers must either manually pivot between these tools or invest in developing complex systems to aggregate and analyse the findings.

As a result, many security teams find it challenging to separate the signal from the noise, prioritise the findings that matter most, and ensure that critical information isn't missed.

With AWS Security Hub, customers can quickly see their entire AWS security and compliance state in one place.

AWS Security Hub collects and aggregates findings from the security services it discovers in a customer's environment, such as intrusion detection findings from Amazon GuardDuty, vulnerability scan results from Amazon Inspector, sensitive data identifications from Amazon Macie, and findings generated by a range of security tools from AWS Partner Network (APN) partners.

Findings are correlated into integrated dashboards that visualise and summarise a customer's current security and compliance status, and highlight trends and Amazon Elastic Compute Cloud (Amazon EC2) instances that are generating an increasing number of findings.

Customers can run automated, continuous configuration and compliance checks based on industry standards and best practices, such as the Center for Internet Security (CIS) AWS Foundations Benchmark, identifying specific accounts and resources that require attention.

AWS Security Hub integrates with Amazon CloudWatch and AWS Lambda, allowing customers to execute automated remediation actions based on specific types of findings.

Customers can also integrate AWS Security Hub with their automation workflows and third-party tools like ticketing, chat, and Security Information and Event Management (SIEM) systems to quickly take action on issues.

Providers such as Alert Logic, Armor, Barracuda, Check Point, Cloud Custodian, CrowdStrike, CyberArk, Demisto, F5, Fortinet, GuardiCore, IBM, McAfee, Palo Alto Networks, Qualys, Rapid7, Splunk, Sophos, Sumo Logic, Symantec, Tenable, Trend Micro, Turbot, and Twistlock have built integrations with AWS Security Hub, with more coming soon.

AWS Lake Formation makes it easier to set up a secure data lake

A lot of customers are talking about data lakes because they understand that it is useful to remove siloes and have all of their data reside in a central place where they can apply analytics and machine learning.

Amazon Simple Storage Service (Amazon S3) is the natural place to have a data lake because of all of the security, access control, operational performance, functionality, and management controls it offers, as well as the proximity to the analytics and machine learning services available in AWS.

It turns out, however, that building and managing a data lake is a complex and time-consuming process that requires customers to load data from diverse sources, set up buckets and partitions, clean and prepare data, configure and enforce security policies across a range of services, granularly configure access control settings, and more.

AWS Lake Formation removes much of this heavy lifting, allowing customers to build a data lake in a matter of days.

Using AWS Lake Formation, customers simply define the data sources they wish to ingest and then select from a prescribed list of data access and security policies to apply, removing the need to define and enforce policies across their analytics applications.

AWS Lake Formation then collects the data and moves it into a new Amazon S3 data lake, extracting technical metadata in the process to Catalogue and organise the data for easier discovery.

The service automatically optimises the partitioning of data to improve performance and reduce costs, transforms data into formats like Apache Parquet and ORC for faster analytics, and also uses machine learning to deduplicate matching records to increase data quality.

Customers can use AWS Lake Formation to centrally define and manage security, governance, and auditing policies for their data lake.

Policies will then be consistently implemented, reducing the duplicative work of manually defining and enforcing them across a customer's security, storage, analytics, and machine learning services.

AWS Lake Formation also provides a centralised, customisable catalogue which describes available data sets and their appropriate business use.

This reduces the time that analysts and data scientists must spend hunting down the right data set for their needs, and enables users to conduct combined, self-service analytics jobs with their choice of analytics and machine learning services, including Amazon EMR, Amazon Redshift, Amazon Athena, Amazon Sagemaker, and Amazon QuickSight.

Related stories
Top stories
Story image
Cybersecurity
The growing threat of CEO fraud and how to mitigate it
By posing as the CEO or other senior figures, attackers guarantee that malicious emails get employees' attention. Many employees are reluctant to question a request from their CEO, so they usually provide the information.
Story image
Security Information and Event Management
LogRhythm announces LogRhythm Axon and new solution enhancements
According to the company, Axon provides an easier way for security teams to achieve better visibility across both cloud and on-prem log sources, helping further establish a foundation for their security practices.
Story image
Virtual Private Network
BT enhances global Cardway portfolio with Mako Networks
BT has announced a significant enhancement to its Cardway portfolio of payment solutions following the signing of a global agreement with Mako Networks.
Story image
Cybersecurity
Swift successfully pilots its Securities View capability
The new capability significantly increases transparency in post-trade processing while preventing costly settlement fails; it will be widely available in 2023.
Story image
Ransomware
Commonwealth tackling rising cybercrime threat in Asia
Ransomware, identity theft, and virtual security attacks identified as growing threats to security and economic growth.
Story image
Microsoft
Yubico research finds concerning trends around authentication security practices
A new global survey from Yubico has found that 59% of employees still rely on usernames and passwords as the primary method to authenticate their accounts.
Story image
Apple
Jamf shows intent to acquire mobile security firm ZecOps
This acquisition positions Jamf to help IT and security teams strengthen their organisation’s mobile security posture.
Story image
Work from home
Jamf showcases new products to simplify and secure work
At the 13th annual Jamf Nation User Conference, the company shared how its continuous product innovation is helping organisations succeed with Apple.
Story image
Cybersecurity
Ransomware attacks continue to increase, report finds
Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months.
Story image
Kaspersky
Cybersecurity loopholes prevalent in South East Asia
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Story image
IT Training
Six ways to transform your cybersecurity training and influence lasting change
If the goal is to win hearts and minds, formal awareness training can fall short and often doesn’t inspire people to care.
Story image
Cloud Security
75% of AU companies had cloud security incident in past year
According to new Venafi research, complexity is due to increase, as companies plan to host more applications in the cloud.
Story image
Mobile Device Management
How to easily scale your mobile workforce and devices for the peak shopping season
Retailers are under constant pressure to streamline processes and become more efficient while looking for ways to improve customer satisfaction levels.
Story image
Network Management
Fortinet introduces enhanced AIOps across its gateways
FortiAIOps builds on Fortinet's rich history of developing artificial intelligence to deliver actionable network insights for self-optimising management.
Story image
Software-as-a-Service
Varonis adds secrets discovery to data classification
The data security firm announces enhancements that detect and remediate overexposed private keys, encryption certificates, API keys, and authentication tokens.
Story image
Cloud
How modern IT architectures are moving beyond network visibility
Dealing with multiple cloud providers makes it difficult to identify security threats and performance bottlenecks and troubleshoot issues.
Story image
Cybersecurity
Best practices for industrial cyber resilience
Operational technology (OT) security is gaining more attention than ever before, but sufficient understanding of what it takes to prevent breaches is still lacking amongst many organisations.
Story image
Malware
Kaspersky uncovers new malicious malware NullMixer
Kaspersky researchers have uncovered a new malware stealing users credentials, address, credit card data, cryptocurrencies, and accounts.
Story image
Software-as-a-Service
Enterprises yet to fully commit to cybersecurity - CompTIA
“Digital transformation driven by cloud and mobile adoption requires a new strategic approach to cybersecurity, but this poses significant challenges."
Story image
Legacy
Trellix enables greater cyber resiliency with extended XDR platform
"Legacy SIEM technology has failed to modernise security operations. We are confident Trellix XDR fills this critical gap.”
AWS Marketplace
Whitepaper: A practical guide for mitigating risk in today’s modern applications
Link image
Story image
Artificial Intelligence
Fortinet advances AIOps to aid the hybrid workforce
"We’re continuing our commitment to AI innovation by delivering AIOps capabilities across our robust portfolio of enterprise networking technology."
Story image
Malware
Decrease in malware volume, but surge in encrypted malware
The Q2 Internet Security Report found office exploits continue to spread more than any other category of malware.
Story image
Threat intelligence
Trellix advances threat intelligence with new research centre
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Story image
Partner Programmes
Trellix set to launch new unified partner program in 2023
"We co-developed the Xtend program with our partners to create the right business model for deploying Trellix XDR."
Story image
Distributed Denial of Service
Sysdig reveals a loss of $53 for every $1 cryptojackers gain
The 2022 Sysdig Cloud Native Threat Report breaks down supply chain attacks against containers and how geopolitical conflict influences attacker behaviours.
Story image
Cybersecurity
De-risking the innovation cycle – a modern, real-time approach to security
Many organisations see cybersecurity as an inhibitor of innovation, with burdensome protection measures standing in the way of progress and speed.
Story image
Malware
Black Lotus Labs discovers new, multipurpose malware
Black Lotus Labs, the threat intelligence team at Lumen, has discovered a new, rapidly growing, multipurpose malware written in the Go programming language.
Story image
Hybrid Cloud
Hybrid cloud security driving need for deep observability
Gigamon is bringing application and network-level intelligence together to help network, security, and cloud IT operations teams eliminate security blind spots.
Story image
Virtual Private Network
95% of organisation rely on VPN as threats continue - report
There is a growing number of VPN-specific security threats and a need for Zero Trust security architecture in enterprise-level organisations.
Story image
Enterprise
Delinea shares the importance of PAM, partners and security for modern enterprise
Identity-based security is becoming a crucial tool for modern enterprises as they continue to adapt to different working environments.
Story image
Edge Security
Security practices for modernising the “spaghetti” of on-premises IT
Many organisations are wondering how to securely modernise their workload, often made up of a “spaghetti” of on-premises applications and management consoles.
Story image
Cybersecurity
Video: 10 Minute IT Jams - An update from SearchInform
Val Novoselova joins us today to to discuss new trends in the information security space, and how SearchInform is adapting to some of the new trends we are seeing.
Story image
Secure Code Warrior
Secure Code Warrior announces Coding Labs innovation
Coding Labs mechanisms allow developers to move from learning to applying secure coding knowledge more efficiently, leading to fewer code vulnerabilities.
Story image
Firewall
Barracuda accelerates growth in its data protection business
Barracuda cloud-to-cloud backup protects against evolving cyber threats, such as ransomware, and is now transactable in the Azure Marketplace.
Story image
Cybersecurity
Test your API Security with Infinite API Scanner
The effectiveness of API scanning technology can mean the difference between successful and unsuccessful programming outcomes, and often enterprises and IT leaders struggle to get it right.
Story image
Cybersecurity
Employees unsure who to go to to report security incident
A new study shows more than 20% of the untrained global workforce do not know who to contact during a security breach.
Story image
Ransomware
Delinea updates DevOps security, remote access more seamless
New enhancements include development support on the most recent Mac computers and improved secrets' management usability through automation.
Story image
Data Protection
99% of security experts unhappy with tokenisation investment
Cybersecurity experts are looking for a solution that provides the strength of tokenisation while removing the friction that has accompanied it in the past.
Story image
Firewall
Forrester names Akamai as web application firewall leader
"We continually monitor and improve our capabilities to defend customers from new threats, while enabling customers to protect evolving attack surfaces."
Aws Marketplace
Learn how to implement a backup and recovery plan for a new generation of Kubernetes-based modern applications
Link image
Story image
Data Protection
Cloudflare brings Data Localisation Suite to more APAC businesses
This allows any business in these countries to service their data locally while benefiting from the speed, security, and scalability of Cloudflare’s global network.