security

AWS Launches General Availability of Amazon Security Lake – TechDecisions


AWS is launching the general availability of Amazon Security Lake, a new service designed to automatically centralize an organization’s security data from across their AWS environments, leading SaaS providers, on-premises environments, and cloud sources into a purpose-built data lake.

According to AWS, this allows customers to act on security data faster and helps them simplify security data management across hybrid and mutlicloud environments.

The Seattle-based tech giant says Amazon Security Lake converts and conforms incoming security data to the Open Cybersecurity Scheme Framework (OCSF) open standard to make it easier for security teams to automatically collect, combine and analyze security data from more than 80 sources. Those sources include AWS, security partners and analytic providers.

Some of those source, subscriber and service partners include Barracuda, Cisco Secure, CrowdStrike, Darktrace, ExtraHop, Lacework, Netscout, Netskope, Okta, Palo Alto Networks, Ping Identity, Trellix, Trend Micro, VMware Ario Automation for Secure Clouds, Wiz, Zscaler, Rapid7, IBM Security, Splunk, Accenture, Booz Allen Hamilton, Deloitte, PwC and many more. Read the full list of partners here.

AWS calls Amazon Security Lake part of a “broad set of AWS Cloud security services built on AWS infrastructure to help make it the most flexible and secure cloud trusted by millions of customers, including some of the most security-sensitive organizations, including some of the most security-sensitive organizations, and is supported by a broad community of security partners to help customers elevate their security in the cloud.”

The company says Amazon Security Lake essentially aggregates and optimizes large volumes of disparate log and event data to help enable faster threat detection, investigation and response so organizations can effectively address potential threats more quickly using their preferred analytics tools.

Amazon Security Lake is designed to help companies aggregate and normalize security data into one consistent schema to help analyze it and understand their vulnerabilities and monitor threats, which can be difficult in hybrid IT environments.

This can also help organizations centralize their security operations and eliminate the need to duplicate and process the same data multiple times in different security solutions, AWS says.

In addition, monitoring new users, tools, and data sources, means managing a complex set of data access rules and security policies to track how data is used while ensuring that employees can still access the information needed to do their jobs. Some security teams create a central repository for all of their security data in a data lake, but AWS says these systems require specialized skills and can take a long time to build.

AWS says the service builds the security data lake using Amazon Simple Storage Service (Amazon S3) and AWS Lake Formation to automatically set up security data lake infrastructure in a customer’s AWS account, providing full control and ownership over security data.

Amazon Security Lake is generally available today in US East (Ohio), US East (N. Virginia), US West (Oregon), Asia Pacific (Singapore), Asia Pacific (Sydney), Asia Pacific (Tokyo), Europe (Frankfurt), Europe (Ireland), Europe (London), and South America (São Paulo) with availability in additional AWS Regions coming soon.

In a statement, Jon Ramsey, the vice president for Security Services at AWS, said security has been the company’s priority since the beginning.

“We also know that customers need trusted partners to extend the benefits of the cloud and make sure their organizations are secure end-to-end,” Ramsey said. “With more than 80 sources providing data to Amazon Security Lake, security teams can achieve greater visibility into potential security threats and how to respond to them, further protecting the workloads, applications, and data that are critical to driving business forward.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!





READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.