AWS Blogs 15小时前
AWS re:Inforce roundup 2025: top announcements
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

在AWS re:Inforce 2025大会上,AWS发布了一系列重要的安全创新,旨在简化大规模安全管理,并帮助企业构建更具弹性的云应用程序。这些更新涵盖了身份验证、威胁检测、网络安全、应用安全等多个方面,旨在提升AWS云环境的整体安全态势,并简化安全配置和管理流程。

🛡️ IAM Access Analyzer新增功能:帮助安全团队验证哪些AWS组织内的主体有权访问关键资源,如S3存储桶、DynamoDB表和RDS快照,通过自动化推理评估多重策略,并在统一的仪表板上提供结果。

🔑 AWS IAM强制MFA:现在对所有类型的账户强制执行多因素身份验证,以阻止超过99%的与密码相关的攻击。支持多种IAM MFA方法,包括FIDO认证的安全密钥。允许每个根用户和IAM用户注册多达8个MFA设备。

🔥 Amazon威胁情报集成:AWS Network Firewall新增功能,利用Amazon威胁情报系统MadPot,持续跟踪恶意软件托管URL、僵尸网络命令与控制服务器和加密货币挖矿池等攻击基础设施,从而识别活动威胁的入侵指标。

🌐 AWS Certificate Manager:引入可导出公共SSL/TLS证书,用于需要安全TLS流量终止的AWS、混合或多云工作负载。

⚙️ AWS WAF简化控制台体验:通过预配置的保护包,减少多达80%的安全配置步骤,安全团队可以快速实施针对特定应用程序类型的全面保护,并通过直观的界面进行自定义控制。

🚀 Amazon CloudFront新界面:简化Web应用程序交付和安全,通过集成AWS WAF的增强型规则包,自动化TLS证书配置、DNS配置和安全设置。

🛡️ AWS Shield新功能:自动发现和分析AWS账户中的网络资源,基于AWS最佳实践对安全风险进行优先级排序,并提供可操作的补救建议,以防御SQL注入和DDoS攻击等威胁。

💡 AWS Security Hub增强功能:将安全信号转化为可操作的见解,帮助安全团队大规模地优先处理和响应关键问题,提供对云环境的全面可见性,同时降低管理多个安全工具的复杂性。

🔍 Amazon GuardDuty扩展威胁检测:现在支持Amazon EKS集群,通过关联Kubernetes审计日志、运行时行为和AWS API活动中的安全信号,帮助检测复杂的多阶段攻击。

✅ AWS MSSP Competency新增类别:涵盖基础设施安全、工作负载安全、应用程序安全、数据保护、身份和访问管理、事件响应和网络恢复等,合作伙伴通过专门的安全运营中心提供24/7监控和事件响应。

💻 Amazon Verified Permissions:发布verified-permissions-express-toolkit,开发者可以使用该开源包在几分钟内为Express Web应用程序API实现授权。

🐞 Amazon Inspector代码安全功能:现已全面可用,通过快速识别和优先处理应用程序源代码、依赖项和基础设施即代码(IaC)中的安全漏洞和错误配置,从而在生产前保护应用程序。

🔒 AWS Backup新增多方审批:针对逻辑气隙保险库,即使AWS账户被入侵,也能通过授权来自指定审批团队的授权,从而恢复备份数据,实现保险库共享和恢复。

<section class="blog-post-content lb-rtxt"><table id="amazon-polly-audio-table"><tbody><tr><td id="amazon-polly-audio-tab"><p></p></td></tr></tbody></table><p>At AWS re:Inforce 2025 (June 16-18, Philadelphia), AWS Vice President and Chief Information Security Officer Amy Herzog delivered the keynote address, announcing new security innovations. Throughout the event, AWS announced additional security capabilities focused on simplifying security at scale and enabling organizations to build more resilient applications in the cloud. Below is a comprehensive roundup of the major security launches and updates announced at this year’s conference.</p><p><a href="https://aws.amazon.com/blogs/aws/verify-internal-access-to-critical-aws-resources-with-new-iam-access-analyzer-capabilities&quot;&gt;Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities</a><br />A new capability in AWS Identity and Access Management Access Analyzer helps security teams verify which principals within their AWS organization have access to critical resources like S3 buckets, DynamoDB tables, and RDS snapshots by using automated reasoning to evaluate multiple policies and provide findings through a unified dashboard.</p><p><a href="https://aws.amazon.com/about-aws/whats-new/2025/06/aws-iam-mfa-root-users-across-all-account-types/&quot;&gt;AWS IAM now enforces MFA for root users across all account types</a><br />The new Multi-Factor Authentication enforcement prevents over 99% of password-related attacks. You can use a range of supported IAM MFA methods, including FIDO-certified security keys to harden access to your AWS accounts. AWS supports FIDO2 passkeys for a user-friendly MFA implementation and allows you to register up to 8 MFA devices per root and IAM user.</p><p><a href="https://aws.amazon.com/blogs/security/improve-your-security-posture-using-amazon-threat-intelligence-on-aws-network-firewall/&quot;&gt;Improve your security posture using Amazon threat intelligence on AWS Network Firewall</a><br />This new Network Firewall managed rule group offers protection against active threats relevant to workloads in AWS. The feature uses the Amazon threat intelligence system <a href="https://www.aboutamazon.com/news/aws/amazon-madpot-stops-cybersecurity-crime&quot;&gt;MadPot&lt;/a&gt; to continuously track attack infrastructure, including malware hosting URLs, botnet command and control servers, and crypto mining pools, identifying indicators of compromise (IOCs) for active threats.</p><p><a href="https://aws.amazon.com/blogs/aws/aws-certificate-manager-introduces-exportable-public-ssl-tls-certificates-to-use-anywhere&quot;&gt;AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere</a><br />You can now use AWS Certificate Manager to issue exportable public certificates for your AWS, hybrid, or multicloud workloads that require secure TLS traffic termination.</p><p><a href="https://aws.amazon.com/about-aws/whats-new/2025/06/aws-waf-web-application-security-configuration-steps-expert-level-protection/&quot;&gt;AWS WAF simplified console experience</a><br />The new AWS WAF console experience reduces security configuration steps by up to 80% through pre-configured protection packs. Security teams can quickly implement comprehensive protection for specific application types, with consolidated security metrics and customizable controls through an intuitive interface.</p><p><a href="https://aws.amazon.com/blogs/aws/amazon-cloudfront-simplifies-web-application-delivery-and-security-with-new-user-friendly-interface&quot;&gt;Amazon CloudFront simplifies web application delivery and security with new user-friendly interface</a><br />Try the simplified console experience with Amazon CloudFront to accelerate and secure web applications within a few clicks by automating TLS certificate provisioning, DNS configuration, and security settings through an integrated interface with AWS WAF’s enhanced Rule Packs.</p><p><a href="https://aws.amazon.com/blogs/aws/new-aws-shield-feature-discovers-network-security-issues-before-they-can-be-exploited-preview&quot;&gt;New AWS Shield feature discovers network security issues before they can be exploited (Preview)</a><br />Shield network security posture management automatically discovers and analyzes network resources across AWS accounts, prioritizes security risks based on AWS best practices, and provides actionable remediation recommendations to protect applications against threats like SQL injections and DDoS attacks.</p><p><a href="https://aws.amazon.com/blogs/aws/unify-your-security-with-the-new-aws-security-hub-for-risk-prioritization-and-response-at-scale-preview/&quot;&gt;Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview)</a><strong><br /></strong> AWS Security Hub has been enhanced to transform security signals into actionable insights, helping security teams prioritize and respond to critical issues at scale. This unified solution provides comprehensive visibility across your cloud environment while reducing the complexity of managing multiple security tools.</p><p><a href="https://aws.amazon.com/blogs/aws/amazon-guardduty-expands-extended-threat-detection-coverage-to-amazon-eks-clusters/&quot;&gt;Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clusters</a><br />Amazon GuardDuty Extended Threat Detection now supports Amazon EKS clusters, helping you detect sophisticated multistage attacks by correlating security signals across Kubernetes audit logs, runtime behaviors, and AWS API activities. This enhancement automatically identifies critical attack sequences that might otherwise go unnoticed, enabling faster response to threats.</p><p><a href="https://aws.amazon.com/blogs/apn/updates-to-the-aws-mssp-competency-deliver-turnkey-security-solutions-for-customers/&quot;&gt;New categories for the AWS MSSP Competency</a><br />The AWS MSSP Competency (previously AWS Level 1 MSSP Competency) now includes new categories covering infrastructure security, workload security, application security, data protection, identity and access management, incident response, and cyber recovery. Partners provide 24/7 monitoring and incident response through dedicated Security Operations Centers.</p><p><a href="https://aws.amazon.com/blogs/security/secure-your-express-application-apis-in-minutes-with-amazon-verified-permissions/&quot;&gt;Secure your Express application APIs in minutes with Amazon Verified Permissions</a><br />Amazon Verified Permissions announced the release of the verified-permissions-express-toolkit, an open-source package that allows developers to implement authorization for Express web application APIs in minutes using Amazon Verified Permissions.</p><p><a href="https://aws.amazon.com/blogs/security/shifting-vulnerability-detection-left-with-amazon-inspector-code-security-capabilities/&quot;&gt;Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security</a><br />Amazon Inspector code security capabilities are now generally available, helping you secure applications before production by rapidly identifying and prioritizing security vulnerabilities and misconfigurations across application source code, dependencies, and infrastructure as code (IaC).</p><p><a href="https://aws.amazon.com/blogs/aws/aws-backup-adds-new-multi-party-approval-for-logically-air-gapped-vaults&quot;&gt;AWS Backup adds new Multi-party approval for logically air-gapped vaults</a><br />Multi-party approval for AWS Backup logically air-gapped vaults enables you to recover your backup data even when your AWS account is compromised, by leveraging authorization from a designated approval team of trusted individuals who can enable vault sharing with a recovery account.</p></section><aside id="Comments" class="blog-comments"><div data-lb-comp="aws-blog:cosmic-comments" data-env="prod" data-content-id="7a66cd6a-ce6c-4b3d-bf59-f318536db378" data-title="AWS re:Inforce roundup 2025: top announcements" data-url="https://aws.amazon.com/blogs/aws/aws-reinforce-roundup-2025-top-announcements/&quot;&gt;&lt;p data-failed-message="Comments cannot be loaded… Please refresh and try again.">Loading comments…</p></div></aside>

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

AWS re:Inforce 安全
相关文章