Tuesday, January 5, 2021

Query to check owner of each table in Redshift

 

Query to check owner of each table in Redshift

SELECT n.nspname AS schema_name,

       pg_get_userbyid(c.relowner) AS table_owner,

       c.relname AS table_name,

       CASE

         WHEN c.relkind = 'v' THEN 'view'

         ELSE 'table'

       END AS table_type,

       d.description AS table_description

FROM pg_class AS c

  LEFT JOIN pg_namespace n ON n.oid = c.relnamespace

  LEFT JOIN pg_tablespace t ON t.oid = c.reltablespace

  LEFT JOIN pg_description AS d

         ON (d.objoid = c.oid

        AND d.objsubid = 0)

WHERE c.relkind IN ('r','v')

ORDER BY n.nspname,

         c.relname


List Metadata Exchange Connections

 



SELECT REPOSITORY_ID,

       REPOSITORY_NAME,

       REPO_TYPE_NAME,

       IMW_REPOSITORY.DELETED_FLAG,

       EFF_FROM_DT,

       EFF_TO_DT

FROM IMW_REPOSITORY,

     IMW_REPO_TYPE

WHERE IMW_REPOSITORY.REPO_TYPE_UID = IMW_REPO_TYPE.REPO_TYPE_UID

AND   IMW_REPOSITORY.DELETED_FLAG = 'N'

AND   REPOSITORY_ID <>('IMM_MASTER_REPOSITORY')

ORDER BY REPOSITORY_UID

Data Quality Elements (DQ Mapplets within PowerCenter)


SELECT OPB_SUBJECT.SUBJ_NAME AS PROJ,

       OPB_MAPPING.MAPPING_NAME AS MAPPING,

       OPB_WIDGET_INST.INSTANCE_NAME AS TRANSFORMATION,

       OPB_WIDGET.LAST_SAVED AS LAST_SAVED

FROM OPB_WIDGET_INST

  INNER JOIN OPB_MAPPING ON OPB_WIDGET_INST.MAPPING_ID = OPB_MAPPING.MAPPING_ID

  INNER JOIN OPB_SUBJECT ON OPB_MAPPING.SUBJECT_ID = OPB_SUBJECT.SUBJ_ID

  INNER JOIN OPB_WIDGET ON OPB_WIDGET_INST.WIDGET_ID = OPB_WIDGET.WIDGET_ID

WHERE OPB_WIDGET.TEMPLATE_ID IN (SELECT PLG_ID FROM OPB_MMD_CATALOG WHERE PLG_DESC LIKE '%Data Quality%');





List Data Quality Mappings


Execute the following query in your Model Repositories (“MRS Repository”) Schema.


 SELECT PRD_ATTR_VALUE,

       PRR_TYPENAME

FROM PR_RESOURCE,

     PR_ATTRIBUTE

WHERE PR_RESOURCE.PRR_ID = PR_ATTRIBUTE.PRA_RESOURCE

AND   PR_ATTRIBUTE.PRD_ATTR_NAME = 'REPO.SERVICE_PROP.UTC_CREATION_TIME_ATTR'

AND   PR_RESOURCE.PRR_TYPENAME LIKE '%TokenStandardiserTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%AssociationTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%AvTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%CaseConverterTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%ClassifierTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%ConsolidationTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%DecisionTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%GroupTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%LabelerTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%MatcherTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%MergeTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%ParserTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%StringDistanceTxImpl'

OR    PR_RESOURCE.PRR_TYPENAME LIKE '%WeightBasedAnalyserTxImpl'


Thursday, May 28, 2020

1. What is Cloud Computing?



 What is Cloud Computing?

Cloud computing is the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the Internet with pay-as-you-go pricing.



NOTE: Please refer to AWS portal for detailed information on all below topics.


30. Trusted Adviser


AWS Trusted Advisor is
  • an online resource
  • Helps you provision your resources following best practices
  • Helps optimize your AWS environment by
    • reducing cost
    • increasing performance
    • increased fault tolerance
    • improving security   

29. Technical Account Manager



Your designated Technical Account Manager (TAM) is your primary point of contact who provides guidance, architectural review, and ongoing communication to keep you informed and well prepared as you plan, deploy, and proactively optimize your solutions.  

  • A dedicated voice within AWS to serve as your technical point of contact and advocate
  • Proactive guidance and best practices to help optimize your AWS environment
  • Orchestration and access to the breadth and depth of technical expertise across the full range of AWS   

28. AWS Abuse team



The AWS Abuse team can assist you when AWS resources are being used to engage in the following types of abusive behavior:    

I. Spam: You are receiving unwanted emails from an AWS-owned IP address, or AWS resources are being used to spam websites or forums.

II. Port scanning: Your logs show that one or more AWS-owned IP addresses are sending packets to multiple ports on your server, and you believe this is an attempt to discover unsecured ports.

III. Denial of service attacks (DOS): Your logs show that one or more AWS-owned IP addresses are being used to flood ports on your resources with packets, and you believe this is an attempt to overwhelm or crash your server or software running on your server.   

IV. Intrusion attempts: Your logs show that one or more AWS-owned IP addresses are being used to attempt to log in to your resources.

V. Hosting objectionable or copyrighted content: You have evidence that AWS resources are being used to host or distribute illegal content or distribute copyrighted content without the consent of the copyright holder.

VI. Distributing malware: You have evidence that AWS resources are being used to distribute software that was knowingly created to compromise or cause harm to computers or machines on which it is installed.

 


27. AWS Support Concierge




 

Included as part of the Enterprise Support plan, the Support Concierge Team are AWS billing and account experts that specialize in working with enterprise accounts. The Concierge team will quickly and efficiently assist you with your billing and account inquiries, and work with you to help implement billing and account best practices so that you can focus on running your business.


26. AWS Support Plans



 

Developer

Business

Enterprise

 

Recommended if you are experimenting or testing in AWS.

Recommended if you have production workloads in AWS.

Recommended if you have business and/or mission critical workloads in AWS.

AWS Trusted Advisor Best Practice Checks

7 Core checks

Full set of checks

Full set of checks

Enhanced Technical Support

Business hours** email access to Cloud Support Associates

Unlimited cases / 1 primary contact

24x7 phone, email, and chat access to Cloud Support Engineers

Unlimited cases / unlimited contacts (IAM supported)

24x7 phone, email, and chat access to Cloud Support Engineers

Unlimited cases / unlimited contacts (IAM supported)

Case Severity / Response Times*

General guidance:
< 24 business hours**

System impaired:
< 12 business hours**

 

 

 

 

 

 

General guidance:
< 24 hours

System impaired:
< 12 hours


Production system impaired:
< 4 hours

Production system down:
< 1 hour

 

 

General guidance:
< 24 hours

System impaired:
< 12 hours


Production system impaired:
< 4 hours

Production system down:
< 1 hour


Business-critical system down:
< 15 minutes

 

Architectural Guidance

General

Contextual to your use-cases

Consultative review and guidance based on your applications

Programmatic Case Management

 

AWS Support API

AWS Support API

 

 

 

 

Third-Party Software Support

 

Interoperability &
configuration guidance
and troubleshooting

Interoperability &
configuration guidance
and troubleshooting

Proactive Programs

 

Access to Infrastructure Event Management for additional fee.

Infrastructure Event Management

Well-Architected Reviews

Operations Reviews

Technical Account Manager (TAM) coordinates access to programs and other AWS experts as needed.

Technical Account Management

 

 

Designated Technical Account Manager (TAM) to proactively monitor your environment and assist with optimization.

Training

 

 

Access to online self-paced labs

Account Assistance

 

 

Concierge Support Team

Pricing

Greater of $29 / month***

- or -

3% of monthly AWS usage

See pricing detail and example.

Greater of $100 / month***

- or -

10% of monthly AWS usage for the first $0–$10K

7% of monthly AWS usage from $10K–$80K

5% of monthly AWS usage from $80K–$250K

3% of monthly AWS usage over $250K

See pricing detail and example.

Greater of $15,000

- or -

10% of monthly AWS usage for the first $0–$150K

7% of monthly AWS usage from $150K–$500K

5% of monthly AWS usage from $500K–$1M

3% of monthly AWS usage over $1M

See pricing detail and example.

 

 


25.4 AWS Storage Gateway




The AWS Storage Gateway is a hybrid storage service that enables your on-premises applications to seamlessly use AWS cloud storage. You can use the service for backup and archiving, disaster recovery, cloud data processing, storage tiering, and migration. Your applications connect to the service through a virtual machine or hardware gateway appliance using standard storage protocols, such as NFS, SMB and iSCSI. The gateway connects to AWS storage services, such as Amazon S3, S3 Glacier, and Amazon EBS, providing storage for files, volumes, and virtual tapes in AWS. The service includes a highly-optimized data transfer mechanism, with bandwidth management, automated network resilience, and efficient data transfer, along with a local cache for low-latency on-premises access to your most active data.


25.3 Amazon S3 Glacier


Amazon S3 Glacier is a secure, durable, and extremely low-cost storage service for data archiving and long-term backup. It is designed to deliver 99.999999999% durability, and provides comprehensive security and compliance capabilities that can help meet even the most stringent regulatory requirements. Amazon S3 Glacier provides query-in-place functionality, allowing you to run powerful analytics directly on your archive data at rest. You can store data for as little as $0.004 per gigabyte per month, a significant savings compared to on-premises solutions. To keep costs low yet suitable for varying retrieval needs, Amazon S3 Glacier provides three options for access to archives, from a few minutes to several hours.


25.2 Amazon EBS - Elastic Block Store




Amazon Elastic Block Store (Amazon EBS) provides persistent block storage volumes for use with Amazon EC2 instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its Availability Zone to protect you from component failure, offering high availability and durability. Amazon EBS volumes offer the consistent and low-latency performance needed to run your workloads. With Amazon EBS, you can scale your usage up or down within minutes—all while paying a low price for only what you provision

25.1 Amazon S3 Transfer Acceleration




Amazon S3 Transfer Acceleration enables fast, easy, and secure transfers of files over long distances between your client and an S3 bucket. Transfer Acceleration takes advantage of Amazon CloudFront’s globally distributed edge locations. As the data arrives at an edge location, data is routed to Amazon S3 over an optimized network path.


25. Storage - Amazon S3



Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.

Storage class

durability 

availability

S3 Standard

99.999999999%

99.99%

S3 Standard-IA

99.999999999%

99.90%

S3 Intelligent-Tiering

99.999999999%

99.90%

S3 One Zone-IA

99.999999999%

99.95%

S3 Glacier

99.999999999%

99.99%

S3 Glacier Deep Archive

99.999999999%

99.99%

RRS (Not recommended)

99.99%

99.99%

 

Encryption:

Data in Transit:  

·         HTTPS

·         SSL/TCL

Data in Rest (Server Side):

·         Managed Keys

·         Customer Provided Keys

·         KMS


24. Security, Identity, and Compliance





AWS Security Hub

AWS Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. There are a range of powerful security tools at your disposal, from firewalls and endpoint protection to vulnerability and compliance scanners. But oftentimes this leaves your team switching back-and-forth between these tools to deal with hundreds, and sometimes thousands, of security alerts every day. With Security Hub, you now have a single place that aggregates, organizes, and prioritizes your security alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie, as well as from AWS Partner solutions. Your findings are visually summarized on integrated dashboards with actionable graphs and tables. You can also continuously monitor your environment using automated compliance checks based on the AWS best practices and industry standards your organization follows. Get started with AWS Security Hub just a few clicks in the Management Console and once enabled, Security Hub will begin aggregating and prioritizing findings.

Amazon Cloud Directory

Amazon Cloud Directory enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions. With Cloud Directory, you can create directories for a variety of use cases, such as organizational charts, course catalogs, and device registries. While traditional directory solutions, such as Active Directory Lightweight Directory Services (AD LDS) and other LDAP-based directories, limit you to a single hierarchy, Cloud Directory offers you the flexibility to create directories with hierarchies that span multiple dimensions. For example, you can create an organizational chart that can be navigated through separate hierarchies for reporting structure, location, and cost center.

Amazon Cloud Directory automatically scales to hundreds of millions of objects and provides an extensible schema that can be shared with multiple applications. As a fully-managed service, Cloud Directory eliminates time-consuming and expensive administrative tasks, such as scaling infrastructure and managing servers. You simply define the schema, create a directory, and then populate your directory by making calls to the Cloud Directory API.

 AWS Identity and Access Management

AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM allows you to do the following:

Manage IAM users and their access: You can create users in IAM, assign them individual security credentials (access keys, passwords, and multi-factor authentication devices), or request temporary security credentials to provide users access to AWS services and resources. You can manage permissions in order to control which operations a user can perform.

Manage IAM roles and their permissions: You can create roles in IAM and manage permissions to control which operations can be performed by the entity, or AWS service, that assumes the role. You can also define which entity is allowed to assume the role.

Manage federated users and their permissions: You can enable identity federation to allow existing identities (users, groups, and roles) in your enterprise to access the AWS Management Console, call AWS APIs, and access resources, without the need to create an IAM user for each identity.

Amazon GuardDuty

Amazon GuardDuty is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.

Enabled with a few clicks in the AWS Management Console, Amazon GuardDuty can immediately begin analyzing billions of events across your AWS accounts for signs of risk. GuardDuty identifies suspected attackers through integrated threat intelligence feeds and uses machine learning to detect anomalies in account and workload activity. When a potential threat is detected, the service delivers a detailed security alert to the GuardDuty console and Amazon CloudWatch Events. This makes alerts actionable and easy to integrate into existing event management and workflow systems.

Amazon GuardDuty is cost effective and easy. It does not require you to deploy and maintain software or security infrastructure, meaning it can be enabled quickly with no risk of negatively impacting existing application workloads. There are no upfront costs with GuardDuty, no software to deploy, and no threat intelligence feeds required. Customers pay for the events analyzed by GuardDuty and there is a 30-day free trial available for every new account to the service. 

Amazon Inspector

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API.

Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Examples of built-in rules include checking for access to your EC2 instances from the internet, remote root login being enabled, or vulnerable software versions installed. These rules are regularly updated by AWS security researchers. 

 Amazon Macie

Amazon Macie is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS. Amazon Macie recognizes sensitive data such as personally identifiable information (PII) or intellectual property, and provides you with dashboards and alerts that give visibility into how this data is being accessed or moved. The fully managed service continuously monitors data access activity for anomalies, and generates detailed alerts when it detects risk of unauthorized access or inadvertent data leaks. Today, Amazon Macie is available to protect data stored in Amazon S3, with support for additional AWS data stores coming later this year.

AWS Artifact

AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS’ security and compliance reports and select online agreements. Reports available in AWS Artifact include our Service Organization Control (SOC) reports, Payment Card Industry (PCI) reports, and certifications from accreditation bodies across geographies and compliance verticals that validate the implementation and operating effectiveness of AWS security controls. Agreements available in AWS Artifact include the Business Associate Addendum (BAA) and the Nondisclosure Agreement (NDA).

AWS Certificate Manager

AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources. SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet as well as resources on private networks. AWS Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates.

With AWS Certificate Manager, you can quickly request a certificate, deploy it on ACM-integrated AWS resources, such as Elastic Load Balancing, Amazon CloudFront distributions, and APIs on API Gateway, and let AWS Certificate Manager handle certificate renewals. It also enables you to create private certificates for your internal resources and manage the certificate lifecycle centrally. Public and private certificates provisioned through AWS Certificate Manager for use with ACM-integrated services are free. You pay only for the AWS resources you create to run your application. With AWS Certificate Manager Private Certificate Authority, you pay monthly for the operation of the private CA and for the private certificates you issue.

AWS CloudHSM

The AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs. CloudHSM offers you the flexibility to integrate with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries.

CloudHSM is standards-compliant and enables you to export all of your keys to most other commercially-available HSMs, subject to your configurations. It is a fully-managed service that automates time-consuming administrative tasks for you, such as hardware provisioning, software patching, high-availability, and backups. CloudHSM also enables you to scale quickly by adding and removing HSM capacity on-demand, with no up-front costs.

AWS Directory Service

AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft AD, enables your directory-aware workloads and AWS resources to use managed Active Directory in the AWS Cloud. AWS Managed Microsoft AD is built on actual Microsoft Active Directory and does not require you to synchronize or replicate data from your existing Active Directory to the cloud. You can use standard Active Directory administration tools and take advantage of built-in Active Directory features such as Group Policy and single sign-on (SSO). With AWS Managed Microsoft AD, you can easily join Amazon EC2 and Amazon RDS for SQL Server instances to a domain, and use AWS Enterprise IT applications such as Amazon WorkSpaces with Active Directory users and groups. 

 AWS Firewall Manager

AWS Firewall Manager is a security management service that makes it easier to centrally configure and manage AWS WAF rules across your accounts and applications. Using Firewall Manager, you can easily roll out AWS WAF rules for your Application Load Balancers and Amazon CloudFront distributions across accounts in AWS Organizations. As new applications are created, Firewall Manager also makes it easy to bring new applications and resources into compliance with a common set of security rules from day one. Now you have a single service to build firewall rules, create security policies, and enforce them in a consistent, hierarchical manner across your entire Application Load Balancers and Amazon CloudFront infrastructure. 

AWS KMS - Key Management Service

AWS Key Management Service (KMS) makes it easy for you to create and manage keys and control the use of encryption across a wide range of AWS services and in your applications. AWS KMS is a secure and resilient service that uses FIPS 140-2 validated hardware security modules to protect your keys. AWS KMS is integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.

AWS Organizations 

AWS Organizations is an account management service that enables you to consolidate multiple AWS accounts into an organization that you create and centrally manage.

 

AWS Organizations enables the following capabilities:

1- Automate AWS account creation and management

2- Consolidate billing across multiple AWS accounts

3- Govern access to AWS services, resources, and regions

4- Centrally manage access policies across multiple AWS accounts

5- Configure AWS services across multiple accounts

 

AWS Organizations offers policy-based management for multiple AWS accounts. With Organizations, you can create groups of accounts, automate account creation, apply and manage policies for those groups. Organizations enables you to centrally manage policies across multiple accounts, without requiring custom scripts and manual processes.

Using AWS Organizations, you can create Service Control Policies (SCPs) that centrally control AWS service use across multiple AWS accounts. You can also use Organizations to help automate the creation of new accounts through APIs. Organizations helps simplify the billing for multiple accounts by enabling you to setup a single payment method for all the accounts in your organization through consolidated billing. AWS Organizations is available to all AWS customers at no additional charge. 

AWS Secrets Manager

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets Manager offers secret rotation with built-in integration for Amazon RDS for MySQL, PostgreSQL, and Amazon Aurora. Also, the service is extensible to other types of secrets, including API keys and OAuth tokens. In addition, Secrets Manager enables you to control access to secrets using fine-grained permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and on-premises.

 AWS Shield

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield: Standard and Advanced.

All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your website or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.

For higher levels of protection against attacks targeting your applications running on Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing (ELB), Amazon CloudFront, and Amazon Route 53 resources, you can subscribe to AWS Shield Advanced. In addition to the network and transport layer protections that come with Standard, AWS Shield Advanced provides additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, and integration with AWS WAF, a web application firewall. AWS Shield Advanced also gives you 24x7 access to the AWS DDoS Response Team (DRT) and protection against DDoS related spikes in your Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing (ELB), Amazon CloudFront, and Amazon Route 53 charges.

AWS Shield Advanced is available globally on all Amazon CloudFront and Amazon Route 53 edge locations. You can protect your web applications hosted anywhere in the world by deploying Amazon CloudFront in front of your application. Your origin servers can be Amazon S3, Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing (ELB), or a custom server outside of AWS. You can also enable AWS Shield Advanced directly on an Elastic IP or Elastic Load Balancing (ELB) in the following AWS Regions - Northern Virginia, Oregon, Ireland, Tokyo, and Northern California.

AWS WAF

AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. AWS WAF gives you control over which traffic to allow or block to your web application by defining customizable web security rules. You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.

AWS Single Sign-On

AWS Single Sign-On (SSO) is a cloud SSO service that makes it easy to centrally manage SSO access to multiple AWS accounts and business applications. With just a few clicks, you can enable a highly available SSO service without the upfront investment and on-going maintenance costs of operating your own SSO infrastructure. With AWS SSO, you can easily manage SSO access and user permissions to all of your accounts in AWS Organizations centrally. AWS SSO also includes built-in SAML integrations to many business applications, such as Salesforce, Box, and Office 365. Further, by using the AWS SSO application configuration wizard, you can create Security Assertion Markup Language (SAML) 2.0 integrations and extend SSO access to any of your SAML-enabled applications. Your users simply sign in to a user portal with credentials they configure in AWS SSO or using their existing corporate credentials to access all their assigned accounts and applications from one place.