This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading
This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading
To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading
With new data breaches being uncovered daily, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe. 2FA is a security by-word nowadays. So, why do you still using old log-on techniques?
All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools varies, however. So do their names. This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. Continue reading
By using cloud storage, in today’s world, we need to make additional efforts in keeping the data protected. If you create a cloud-based folder with the same sharing practices, hackers and industrial spies can access it, even if you do not show the URL on the Internet.
In this article, you will learn about some recent data leaks and how to keep your sensitive data safe by implementing encryption and IAM policy best practices.
Amazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.
Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
This article refers to CloudBerry Explorer 4.0.8, CloudBerry Drive 1.4.3 and later.
Here in CloudBerry, we improve our products to help you build a more reliable, effective and secure environment. So here's the news for Amazon storage users:
- You can run CloudBerry products on Microsoft Windows Server powered Amazon EC2 instances,
- And do it securely with Amazon Identity and Access Management (IAM) Roles.
CloudBerry Backup and CloudBerry Explorer provide users with an ability to leverage Amazon Identity and Access Management (IAM) service that allows to create multiple users for one AWS account and specify access rights for each user.
Below is a brief guide on how to:
- Use CloudBerry Explorer to configure multiple users with limited access to Amazon Glacier account
- Generate individual Access and Secret Keys for each user in CloudBerry Explorer
- Сonfigure CloudBerry Backup to use AWS IAM user account.