Application Security in AWS: From Basics to Advanced Protection – Webinar Summary

We had the pleasure of co-hosting a webinar titled “Application Security in AWS: From Basics to Advanced Protection” with Tomasz Wojtas from CLICO. We would like to thank all the participants for their attendance. For those who couldn’t join us, we have prepared a brief summary of the key topics discussed during the session.

3 minutes

We had the pleasure of co-hosting a webinar titled “Application Security in AWS: From Basics to Advanced Protection” with Tomasz Wojtas from CLICO. We would like to thank all the participants for their attendance. For those who couldn’t join us, we have prepared a brief summary of the key topics discussed during the session.

The agenda of our webinar included:

  1. Overview of native AWS security services
  2. Application Protection Platform solutions
  3. Comparative analysis – what is missing in AWS?
  4. Q&A session

Overview of Native AWS Security Services

In the first part of the webinar, we presented a wide range of tools and services offered by AWS that help secure applications. We discussed services such as AWS Identity and Access Management (IAM), AWS Web Application Firewall (WAF), Amazon GuardDuty, AWS Shield, AWS Security Hub, as well as functionalities like data encryption (AWS Key Management Service) and event monitoring and logging (AWS CloudTrail and Amazon CloudWatch)

Application Protection Platform Solutions

The next part of the webinar focused on Application Protection Platform solutions that enhance application security. We discussed how these platforms can integrate with the AWS ecosystem, providing additional layers of protection, such as advanced threat detection mechanisms, automated incident response, and compliance with legal regulations.

Legal Regulations and Their Impact on Application Security

We couldn’t overlook the topic of legal regulations, which impose additional requirements and restrictions on organizations. We discussed key regulations such as GDPR, PCI-DSS, and HIPAA, and their impact on managing application security in the cloud. We also shared best practices for compliance with these regulations.

Examples of Real-World Issues and Solutions

We presented examples of real-world security issues at various stages of the application lifecycle (Build/Deploy/Runtime) and ways to solve them. We highlighted common configuration errors, security gaps, and attack techniques that cybercriminals might exploit. We also provided specific examples of tools and procedures that can help in effectively detecting and mitigating these issues.

Webinar Recording

If you couldn’t attend the webinar or would like to watch it again, the recording is available at the link below:

Once again, thank you for your participation and we encourage you to follow our upcoming events! If you have any additional questions or would like to learn more about AWS services and application security, feel free to contact us.

Best regards,

Jarosław Zieliński 
CEO Welastic