AWS Identity

All Photos
Learn how to manage users & groups in @okta & enable automatic provisioning (synchronization) of information from Okta to AWS Single Sign-On, using the System for Cross-domain Identity Management (SCIM) protocol 👉
Check out this workshop to get hands-on experience creating perimeters around your data by restricting access to authorized users & to trusted identities 👇…J
Security has been and always will be the No. 1 priority at #AWS. It was great to share the virtual stage with @StephenSchmidt and others at AWS #reInforce today, covering all things security, identity, and compliance.
Retweeted by AWS Identity
In this demo, learn how to preview public & cross-account access, before deploying resource permissions, using AWS IAM Access Analyzer 👉
Getting started with AWS Single Sign-On? Find out more about our features 👇…j
27/ Tips for our customers? Continually get educated on the different policy types!… @AWSIdentity @AWSSecurityInfo #reInforce
Retweeted by AWS Identity
key point from Brigid, don’t wait until the end to tune those IAM policies. start early and make it a continuous activity @awscloud #reinforce
Retweeted by AWS Identity
25/ AWS will keep on iterating for all these validation and last access checks. Example, last week IAM Access Analyzer now can point to your Organization's trail - a central log aggregated from all your org's accounts. @AWSIdentity @AWSSecurityInfo #reInforce
Retweeted by AWS Identity
23/ AWS is moving towards having policy creation and validation earlier in the development cycle to help the dev process. IAM's policy validation feature now has 100's of checks, and customers are putting this in their dev pipelines! @AWSIdentity @AWSSecurityInfo #reInforce
Retweeted by AWS Identity
"Customers who are successful look for common things-- what are the common things that should be true across environments and implement them as guardrails" Brigid Johnson on journey to Least Privilege #reinforce #awsidentity
Retweeted by AWS Identity
Notes from #reinforce: @AWSIdentity customers are using data perimeters to help put more friction in the path of unintended internal lateral movement.
Retweeted by AWS Identity
20/ Many companies had to change due to the past year. AWS has seen this reflected in customers' AWS Cognito usage. Another customer pivoted to implementing a new mobile drink dispenser solution.
Retweeted by AWS Identity
100+ checks with IAM Access Analyzer which you can use out of the box in the console or integrate within your CI/CD pipelines with A2 APIs #reinforce #awsidentity
Retweeted by AWS Identity
Special guests Senior Software Development Manager, @bjohnso5y & Senior Security Solutions Architect, Jesse Fuchs are now discussing evolving customer needs & will share their perspectives on Identity trends 👉
16/ SET permissions by using Access Analyzer to generate policies from your access activity. And you can do this through your org's CloudTrail logs! And validate your policies with the new policy validation feature.… @AWSIdentity #reInforce
Retweeted by AWS Identity
"The best security comes with using Identity-centric and Security-centric controls together" @GirlGanache #reinforce @AWSIdentity
Retweeted by AWS Identity
This foundation includes organizing your AWS environment, centralizing management of workforce identities, establishing your data perimeter, & embarking on a least-privilege permissions journey.…
2/ Companies have also shifted to offering online goods and services. Restaurants. Conferences. New customers using new virtual services. So we have remote identities, access controls, online services - Zero Trust is even more important! @AWSIdentity @AWSSecurityInfo #reInforce
Retweeted by AWS Identity
Notes from #reinforce: @AWSIdentity has seen a lot of companies suddenly focusing on identity projects that they otherwise would have put off because they have to support a remote workforce and online customer base.
Retweeted by AWS Identity
In “Building for the future with AWS Identity”, Karen will discuss how identity trends are accelerating & will share tips for building a foundation to support these trends.…
🏇 Starting in a few minutes: "Building for the future with@AWSIdentityy Services" with Karen Haberkorn, Director of Product Management for AWS Identity 💫 I'll be tweeting the highlights@AWSIdentityt@AWSSecurityInfof#reInforcecSd
Retweeted by AWS Identity
Next up, join us for the #reInforce leadership session, 🏗️ Building for the future with AWS Identity, led by our Director of Product Management, Karen
I'd recommend everyone to dial in to this! The cultural aspect of security is just as important as the technical aspect (if not more). The culture of your org affects how everyone views, responds, and adapts to changing needs of the org. @AWSIdentity @AWSSecurityInfo #reInforce…
Retweeted by AWS Identity
. @JKenBeer once mentioned to me that encryption is a form of access control. That perspective 🤯 made encryption all the more exciting especially with the options that AWS provides. Here's a neat blog demonstrating…p…Zq
Retweeted by AWS Identity
ICYMI: A couple of key Identity & Access Management best practices from @StephenSchmidt's #reInforce keynote: 1️⃣ Review your permissions regularly 2️⃣ Use least privilege in IAM 👉
all of the “access analyzer” features are part of an @awscloud initiative called, “provable security" learn more about this (trust me, it’s super interesting and cool. lots of math under the hood) at… #reinforce
Retweeted by AWS Identity
@marknca @awscloud Don't trust one set of security controls for your security. Use identity centric and network centric controls (e.g. VPC Endpoints) to augment your overall security. @AWSIdentity
Retweeted by AWS Identity
Tune in to tomorrow's AWS #reInforce leadership session with our Director of Product Management, Karen Haberkorn. She'll discuss how to build for the future with AWS Identity and answer questions in a live panel featuring @bjohnso5y & Jesse Fuchs 👇
Did you know that the Director of Product Management for @AWSIdentity is a woman? She's brilliant, and you should listen to her perspectives on what's coming next in cloud identity and access. She'll be livestreaming Tuesday at 11:45am PT / 2:45pm ET.…
Retweeted by AWS Identity
IAM Access Analyzer helps you generate IAM policies based on access activity stored in your organization trail.
When you build on AWS, you want to ensure you grant the right access, to the right people, at the right time. Enroll in our Introduction to AWS Identity and Access Management course to learn foundational knowledge and skills, taught by our experts 👇.
1/ 📣 Identity and Access Management is critical to security 🔐. Check out what Karen Haberkorn, Director of Product Management for AWS Identity, has to say about how AWS helps you manage and secure your critical data and resources in AWS! 11:45am PT / 2:45pm…pD
Retweeted by AWS Identity
Log in to Amazon WorkSpaces using smart cards with AWS Directory Service in 5 additional regions in the US, Europe, & Asia Pacific.
Amazon S3 on Outposts now supports sharing of S3 capacity across multiple accounts using #AWSRAM managed permissions.
Learn how to use AWS Resource Access Manager's new managed permissions to enable granular access to your shared resources. #AWSRAM demo -
ICYMI! 🚀 AWS Resource Access Manager enables granular access control with additional managed
AWS Single Sign-On #AWSSSO is now available in the Europe (Paris) Region.
AWS Directory Service for Microsoft Active Directory & AD Connector are now available in the Asia Pacific (Osaka) Region.
Automate resolution for IAM Access Analyzer cross-account access findings on #AWSIAM roles.
AWS Single Sign-On is now available in the South America (São Paulo) Region.
Build an end-to-end attribute-based access control strategy with AWS SSO & Okta.
Have you registered for #reInforce yet? This event will offer interactive educational content to help you modernize your security strategy as well as tools to stay ahead of the evolving security landscape. Register:…
Retweeted by AWS Identity
New! 🚀 IAM Access Analyzer adds new policy checks to help validate conditions during#AWSIAMM policy authoring.
#Identiverse 2021 continues with a Virtual Keynote today at 12pm PDT with @jim_scharf, VP of #AWS Identity, who will share how customer obsession plays out on a day-to-day basis & what our customers are pushing us to build next.
Huge shoutout to everyone involved in building the CIDPRO - Certified Identity Professional - Foundational certification from @idpro_org So excited to hear @Sarah_Cecc to announce this at @Identiverse
Retweeted by AWS Identity
1/ 📣�@Identiversese, the premier conference for identity professionals, begins today! AWS is a sponsor and will be presenting in-person and live sessions the next few weeks. For those who are attending, here's a thread of the sessions not to miss@AWSIdentityty
Retweeted by AWS Identity
Amazon Cognito is now available in the Middle East (Bahrain) Region.
Use AWS Directory Service with the AWS Transfer Family to securely provide permissions for file transfers to users in your AD groups. #AWSDirectoryService
New[-ish] #AWS White Paper - Organizing Your AWS Environment Using Multiple Accounts -…
Retweeted by AWS Identity
Twiends™ uses the Twitter™ API, displays it's logo & trademarks, and is not endorsed or certified by them. These items remain the property of Twitter. We do not sell followers, we only provide display advertising. Bots & fake accounts are not permitted on twiends. © 2009
Grow Your Twitter Free
Want To Grow Your Twitter?
We help other people find and follow you on Twitter.
Key Info:
Started in 2009
Over 6 million signups
Country targeting provided
We never auto tweet to your timeline
We never auto follow others
We actively moderate our community
Please Share
Please upgrade your browser  chrome