With Multi-Factor Authentication (MFA) in recent cybersecurity headlines, AWS announced two MFA-related updates last week: 1. AWS is adding passkeys to the list of supported MFA options for root and AWS Identity and Access Management (IAM) users For the first release, they decided to use passkeys as a second factor authentication, in addition to a password (not as a replacement for it). 2. AWS is starting to ENFORCE MFA on root users, starting with the root user of the management account in an AWS Organization, with plans to roll out to other accounts the rest of the year MFA is (fortunately) becoming mandatory (with enforcement) on major service provider platforms and SaaS products. Need help with your MFA strategy or have questions? Contact us at the link below: https://lnkd.in/gxeqZBnk
Soteria - Security Solutions & Advisory’s Post
More Relevant Posts
-
The concepts of 'Safety' and 'Preservation from harm' are deeply embedded in our mission. And our name.
To view or add a comment, sign in
-
-
"How can Soteria help with my SIEM efforts?" In-house SIEM adoption efforts are often time, resource, and cost intensive. Without detection engineering expertise, out of the box alerts flood the Security Operations Center (SOC) with noise and false positives. More log sources and longer data retention requirements result in SIEM bills going up while security value stays the same (see diagram). Those bills overrun Information Security program budgets, taking away your ability to serve other areas of need. So, how can we help you address these SIEM challenges https://soteria.io/siem/
To view or add a comment, sign in
-
-
Our internal team recommended we share this article. For those who use RADIUS, please take note. https://lnkd.in/d25iMFe7 Additional CVE information: https://lnkd.in/gpSthfjj For assistance, get in touch with our team. soteria.io
To view or add a comment, sign in
-
Conditional Access with Microsoft Intune compliance policies provides a powerful approach to controlling which devices and apps can access your email and company resources. Conditional Access works with Intune's Device Configuration and Compliance policies, and with Intune's Application Protection policies. Together they make sure only managed and compliant devices can access email, Microsoft 365 services, Software as a service (SaaS) apps, and on-premises apps. To learn more: https://lnkd.in/gPRHRi_s Need help securing your Microsoft tenant? https://lnkd.in/gxeqZBnk
To view or add a comment, sign in
-
-
Grateful and privileged to live in this great nation. We hope you have a happy, healthy, safe 4th of July.
To view or add a comment, sign in
-
-
Security enhancements on the roadmap and in preview in Microsoft Windows Server 2025: - Enhanced encryption standards and LDAP encryption enabled-by-default - Improved security for default machine account passwords - SMB signing and encryption auditing Several features are introduced to Microsoft LAPS that bring the following improvements: - New automatic account management feature - New image rollback detection feature - New passphrase feature To see what's new in Windows Server 2025, please visit: https://lnkd.in/gmGfaqt9
What's new in Windows Server 2025
learn.microsoft.com
To view or add a comment, sign in
-
Are you prepared to handle Incident Response in your AWS accounts? Like many things AWS Security, preparation often starts with your AWS Account structure. From the AWS Security IR Guide: It’s helpful to have a structure that supports the functions of incident response, such as having a security Organizational Unit (OU) and a forensics OU. Within the security OU, you should have accounts for: Log archival – Aggregate logs in a log archival AWS account Security tooling – Centralize security services in a security tool AWS account Within the forensics OU, you have the option to implement a single forensics account or accounts for each Region that you operate in, depending on which works best for your business and operational mode. Because it takes time to provision new accounts, it is imperative to create and instrument the forensics accounts well ahead of an incident so that responders can be prepared to effectively use them for response. The following diagram displays a sample account structure including a forensics OU with per-Region forensics accounts: For help or to answer your AWS Security questions, contact our team today: https://lnkd.in/gxeqZBnk For more details from AWS, review the AWS IR Guide: https://lnkd.in/gZ4JWQY
To view or add a comment, sign in
-
-
One year on from the enactment of the "Final Rule" (https://lnkd.in/e2UUqQMq) of the Gramm-Leach-Bliley Act (GLBA), we continue to excel at helping clients satisfy the annual requirements of the Safeguards Rule. If you need assistance with one or more of the Safeguards Rule elements or have questions, contact us today: https://lnkd.in/gxeqZBnk
To view or add a comment, sign in
-
New feature release for Soteria Inspect for Microsoft 365 One of the most requested features from clients is the ability to pause or 'mute' an Inspector. This is desired when a particular Inspector's finding is an accepted risk or is mitigated through external compensating controls. We are excited to announce that Inspector Pausing is now live! Want to try it yourself? Sign up for the free trial today https://lnkd.in/gbz7r7Ji
To view or add a comment, sign in
-
-
Security tools, while valuable and important, can be noisy. That noise creates overhead and makes locating real threats difficult and time consuming, becoming a "find the needle in a haystack" problem. Soteria Defense MDR provides many values. One of them is Quiet. Taken from a real client touchpoint, this image shows the Quiet our team delivers. The client's security platforms generated 528 alerts. We managed, triaged, and responded to them on their behalf. The result? The client's team only had to touch ONE alert for the entire month, a 528 to 1 reduction. Keep your focus on delivering your mission. Leave the cybersecurity to us. Want results like this? https://lnkd.in/gxeqZBnk
To view or add a comment, sign in
-