AWS Resource Groups geben jetzt Lebenszyklusereignisse aus

Heute veröffentlicht AWS Resource Groups eine neue Funktion, die Lebenszyklusereignisse auslöst, wenn Ressourcen zu Ihren Gruppen hinzugefügt oder daraus entfernt werden und wenn Ressourcengruppen erstellt, aktualisiert oder gelöscht werden. Diese Ereignisse ermöglichen Ihnen, automatisierte, ereignisgesteuerte Workflows für Ihre Anwendungen zu initiieren. Mit diesen Ereignissen können Sie beispielsweise die Initiierung allgemeiner Betriebsaufgaben automatisieren, z. B. das Installieren von Softwarepaketen, das Erstellen von Backups oder das Erstellen von Snapshots von Amazon Elastic Block Store.
Quelle: aws.amazon.com

Daten-Tiering von Amazon ElastiCache für Redis ist jetzt in der AWS-Region „Europa (Stockholm)“ verfügbar

Sie können jetzt das Daten-Tiering für Amazon ElastiCache für Redis als kostengünstige Möglichkeit zur Skalierung Ihrer Cluster auf bis zu Hunderte von Terabyte an Kapazität in der Region „Europa (Stockholm)“ nutzen. Das Daten-Tiering bietet eine neue Preis-Leistungs-Option für Redis-Workloads, indem zusätzlich zur Speicherung der Daten im Speicher kostengünstige Solid State Drives (SSDs) in jedem Clusterknoten verwendet werden. Es ist ideal für Workloads, die regelmäßig auf bis zu 20 % ihres gesamten Datenbestands zugreifen, und für Anwendungen, die zusätzliche Latenzzeiten beim Zugriff auf SSD-Daten tolerieren können.
Quelle: aws.amazon.com

Amazon Kendra veröffentlicht Microsoft Exchange Connector zum Ermöglichen der Suche in E-Mail-Nachrichten

Amazon Kendra ist ein intelligenter Suchservice, der auf Machine Learning basiert und mit dem Unternehmen ihren Kunden und Mitarbeitern bei Bedarf notwendige Informationen zur Verfügung stellen können. Ab heute können AWS-Kunden den Microsoft (MS) Exchange Connector von Amazon Kendra verwenden, um Dokumente aus MS Exchange zu indexieren und zu durchsuchen.
Quelle: aws.amazon.com

AWS Config unterstützt 22 neue Ressourcentypen

AWS Config unterstützt jetzt 22 weitere Ressourcentypen für Services wie Amazon MQ, AWS AppConfig, AWS Cloud9, Amazon EventBridge, Amazon Fraud Detector, AWS IoT, AWS IoT Analytics, Amazon Lightsail (Virtual Server), AWS Elemental MediaPackage, Amazon Route 53 Recovery Readiness, AWS Resilience Hub und AWS Transfer.
Quelle: aws.amazon.com

How Confidential Space and multi-party computation can help manage digital assets more securely and efficiently

Managing digital asset transactions and their often-competing requirements to be secure and timely can be daunting. Human errors can lead to millions in assets being instantly lost, especially when managing your own encryption keys. This is where multi-party computation (MPC) can help reduce risk stemming from single points of compromise and facilitate instant, policy-compliant transactions. MPC has proven valuable to help secure digital asset transactions because it can simplify the user experience, and it can create operational efficiencies, while users retain control over their private keys. Google Cloud customers can implement MPC solutions with our new Confidential Space, which we introduced at Google Cloud Next in October. MPC enabled by Confidential Space can offer many benefits to safely manage and instantly transact digital assets:Digital assets can be held online without requiring cold storage.You can use an institutional-grade custody solution without having to give up control of your private keys.  Distributed parties can participate in a signing process that is both auditable and policy-compliant.All parties can produce their signatures while not exposing secret material to other parties, including the MPC platform operator.An individual private key represents a single point of failure in the digital asset custody and signing process. In an MPC-compliant model, an individual private key is replaced with distributed key shares. Each key shareholder collaborates to sign a transaction, and all actions performed by all parties are logged for offline auditing. No key holder exposes their key share to another key holder or to the platform operator. Unlike multi-signature, a single private key is not assembled or stored anywhere.Figure 1 – Multi-Party Computation for transacting digital assets.An attacker coming from outside the organization would need to compromise multiple parties across multiple distributed operating environments in order to get access to a key that can sign a transaction. MPC is resistant to insider attacks against the platform operator or key holder because no single key can sign a transaction and the operator can not access the key. Since multiple parties must come together to approve and sign each transaction, MPC-based digital asset custody solutions can better facilitate governance. The solutions provide the ability to create and enforce policies that control who must approve transactions. This prevents a single malicious insider from stealing assets, including the party that owns the workload or a workload operator. Because Confidential Space is built on our Confidential Computing platform, it leverages remote attestation and AMD’s Secure Encrypted Virtualization (SEV). This allows us to offer a more secure environment, fast performance, and seamless workload portability. This foundation can enable the MPC operator and co-signer workloads to run in a Trusted Execution Environment (TEE). Co-signers can have control over how their keys are used and which workloads are authorized to act on them. Finally, with the hardened version of Container-Optimized OS (COS), Confidential Space blocks the workload operator from influencing the signing workload.Deploying MPC on Confidential Space provides the following differentiated benefits:Isolation: Ensures that external parties cannot interfere with the execution of the transaction signing process.Confidentiality: Ensures that the MPC platform operator has no ability to access the key material.Verifiable attestations: Allows co-signers to verify the identity and integrity of the MPC operator’s workload before providing a signature.“MPC solutions will become increasingly essential as blockchains continue to support more critical infrastructure within the global financial system,” said Jack Zampolin, CEO of Strangelove Labs.“As a core developer building and hosting critical infrastructure in the rapidly growing Cosmos ecosystem, MPC-compliant systems are an important focus area for Strangelove. We are excited to expand our relationship with Google Cloud by building out key management integrations with our highly available threshold signer, Horcrux.”In 2022 the Web3 community celebrated the Ethereum merge, one of several engineering advancements that can encourage applications of MPC. For example, MPC could be used for the efficient management of Ethereum validator keys. To learn more about MPC and Web3 with Google Cloud, please reach out to your account team. If you’d like to try Confidential Space, you can take it for a spin today.We’d like to thank Atul Luykx and Ross Nicoll, software engineers, and Nelly Porter and Rene Kolga, product managers, for their contributions to this post.
Quelle: Google Cloud Platform