Building an image searching solution with the AWS CDK

By Dustin Ward

AWS FeedBuilding an image searching solution with the AWS CDK This post is written by Mohsen Damshenas, Partner Solutions Architect, Global System Integrators. This post explains a fully serverless solution for searching images based on their content. This solution enables images uploading to Amazon S3 and image analysis with Amazon Rekognition. It supports database access…

LeasePlan Sitecore Implementation with Amazon EKS

By Dustin Ward

AWS FeedLeasePlan Sitecore Implementation with Amazon EKS LeasePlan is one of the world’s leading car leasing companies, with 1.9 million vehicles in more than 30 countries. They manage the entire lifecycle of their fleet, from purchase and maintenance to the sale of returned lease cars. Sitecore is a leading content management system in the enterprise…

IAM Access Analyzer now supports over 100 policy checks with actionable recommendations to help you author secure and functional policies

By Dustin Ward

AWS FeedIAM Access Analyzer now supports over 100 policy checks with actionable recommendations to help you author secure and functional policies AWS Identity and Access Management (IAM) Access Analyzer makes it easier to implement least privilege permissions by analyzing resource policies to provide provable security and help you identify unintended public or cross-account access. A…

AWS achieves its first ISMAP certification in Japan

By Dustin Ward

AWS FeedAWS achieves its first ISMAP certification in Japan Earning and maintaining customer trust is an ongoing commitment at Amazon Web Services (AWS). Our customers’ industry security requirements drive the scope and portfolio of the compliance reports, attestations, and certifications we pursue. We’re excited to announce that AWS has achieved certification under the Information System…

IAM Access Analyzer Update – Policy Validation

By Dustin Ward

AWS FeedIAM Access Analyzer Update – Policy Validation AWS Identity and Access Management (IAM) is an important and fundamental part of AWS. You can create IAM policies and service control policies (SCPs) that define the desired level of access to specific AWS services and resources, and then attach the policies to IAM principals (users and…