AWS Certificate Manager updates default certificate validity to comply with new guidelines

Starting today, public certificates issued from AWS Certificate Manager (ACM) have a maximum validity period of 198 days, compared to previous validity period of 395 days. With this change, ACM-issued public certificates will be compliant with new Certification Authority Browser (CA/Browser) Forum mandate that certificates be no longer than 200 days starting 15th March 2026. No action is required from the customers to receive this change. All new and renewed public certificates will by default have a validity of 198 days. Existing certificates with 395 days validity continue to be valid and can be used until they renew or expire. All other certificate functionality remains in place. ACM will still continue to auto renew the certificates before expiry. The certificates are now renewed 45 days before expiry. Existing 398 day validity certificates will renew 60 days before expiry and will renew with 198 days validity period. We have reduced the pricing for ACM’s exportable public certificates in line with the shorter validity period. 198-day exportable public certificate will now cost $7/Fully Qualified domain name (down from $15) and $79/ wildcard name (down from $149). Please refer to ACM’s pricing page for more details. For more information about ACM, visit the ACM documentation.
Quelle: aws.amazon.com

Amazon EC2 M8i-flex instances are now available in additional AWS regions

Starting today, Amazon EC2 M8i-flex instances are now available in Asia Pacific (Malaysia, Seoul, Singapore, Tokyo), Europe (Frankfurt) and Canada (Central) regions. These instances are powered by custom Intel Xeon 6 processors, available only on AWS, delivering the highest performance and fastest memory bandwidth among comparable Intel processors in the cloud. The M8i-flex instances offer up to 15% better price-performance, and 2.5x more memory bandwidth compared to previous generation Intel-based instances. They deliver up to 20% better performance than M7i-flex instances, with even higher gains for specific workloads. The M8i-flex instances are up to 30% faster for PostgreSQL databases, up to 60% faster for NGINX web applications, and up to 40% faster for AI deep learning recommendation models compared to M7i-flex instances. M8i-flex instances are the easiest way to get price performance benefits for a majority of general-purpose workloads like web and application servers, microservices, small and medium data stores, virtual desktops, and enterprise applications. They offer the most common sizes, from large to 16xlarge, and are a great first choice for applications that don’t fully utilize all compute resources. To get started, sign in to the AWS Management Console. For more information about the M8i-flex instances visit the AWS News blog.
Quelle: aws.amazon.com

Aurora DSQL launches new Go, Python, and Node.js connectors that simplify IAM authentication

Today we are announcing the release of Aurora DSQL Connectors for Go (pgx), Python (asyncpg), and Node.js (WebSocket for Postgres.js) that simplify IAM authentication for customers using standard PostgreSQL drivers to connect to Aurora DSQL clusters. These connectors act as transparent authentication layers that automatically handle IAM token generation, eliminating the need to write token generation code or manually supply IAM tokens. Tokens are automatically generated for each connection, ensuring valid tokens are always used while maintaining full compatibility with existing PostgreSQL driver features. The Postgres.js connector additionally supports WebSocket protocol, enabling customers to connect to DSQL clusters in environments where TCP connections are not available. These connectors streamline authentication and eliminate security risks associated with traditional user-generated passwords. All three connectors support custom IAM credential providers, giving customers flexibility in how they manage their AWS credentials. To get started, visit the Connectors for Aurora DSQL documentation page. For code examples, visit our Github page for pgx for Go, asyncpg for Python, and Websocket for Postgres.js. Get started with Aurora DSQL for free with the AWS Free Tier. To learn more about Aurora DSQL, visit the webpage.
Quelle: aws.amazon.com

AWS Clean Rooms announces support for remote Apache Iceberg REST catalogs

AWS Clean Rooms now supports catalog federation for remote Iceberg catalogs. This capability simplifies clean room setup by providing direct, secure access to Iceberg tables stored in Amazon S3 and cataloged in remote catalogs—without requiring table metadata replication. Organizations can now use AWS Glue catalog federation to provide direct access to their existing Iceberg REST catalog in a Clean Rooms collaboration. For example, a media publisher with data cataloged in the AWS Glue Data Catalog and an advertiser with data cataloged in a remote Iceberg catalog can analyze their collective datasets to evaluate advertising spend—without having to build ETL data pipelines or share underlying data with one another. AWS Clean Rooms helps companies and their partners easily analyze and collaborate on their collective datasets without revealing or copying one another’s underlying data. For more information about the AWS Regions where AWS Clean Rooms is available, see the AWS Regions table. To learn more about collaborating with AWS Clean Rooms, visit AWS Clean Rooms.
Quelle: aws.amazon.com

Amazon Managed Grafana now supports AWS KMS customer managed keys

Amazon Managed Grafana now supports customer-managed keys (CMK) through AWS Key Management Service (KMS), enabling you to encrypt data stored in in your Amazon Managed Grafana workspaces with your own encryption keys. Amazon Managed Grafana is a fully managed service based on open-source Grafana that makes it easier for you to visualize and analyze your operational data at scale.
Amazon Managed Grafana provides encryption at rest using AWS owned keys by default. With this launch, you now have an option to use a customer-managed key when creating an Amazon Managed Grafana workspace. This allows you to add a self-managed security layer, helping you meet your organization’s compliance and regulatory requirements.
This feature is now available in all regions where Amazon Managed Grafana is generally available, except in AWS GovCloud (US) Regions. To get started with Amazon Managed Grafana, refer Amazon Managed Grafana user guide. To learn more about Amazon Managed Grafana, visit the product page and pricing page.
Quelle: aws.amazon.com