{"id":1779,"date":"2025-02-05T03:23:54","date_gmt":"2025-02-05T03:23:54","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1779"},"modified":"2025-02-05T03:23:54","modified_gmt":"2025-02-05T03:23:54","slug":"aws-tightens-default-security-on-redshift","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1779","title":{"rendered":"AWS tightens default security on Redshift"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Amazon\u2019s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an expert.<\/p>\n<p>Loris Degioanni, chief technology officer at Sysdig, told CSO that AWS\u2019s enhanced security defaults for Amazon Redshift are a \u201cnecessary evolution for the accelerated cloud adoption we\u2019ve seen across organizations with varying security expertise. Secure configurations are the first line of defense, and by enforcing best practices from day one, these changes reinforce the shift-left mindset Sysdig has long championed. However, security doesn\u2019t stop at strong defaults \u2014 continuous monitoring, risk prioritization, and real-time threat detection are critical.\u201d<\/p>\n<p>Redshift allows organizations to store and analyze their data using their choice of business intelligence tools. <a href=\"https:\/\/discovery.hgdata.com\/product\/amazon-redshift\">According to HGInsights<\/a>, just over 27,700 organizations use Redshift.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Amazon\u2019s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an expert. Loris Degioanni, chief technology officer at Sysdig, told CSO that AWS\u2019s enhanced security defaults for Amazon Redshift are a \u201cnecessary evolution for the accelerated cloud adoption we\u2019ve seen across organizations with varying security expertise. Secure configurations are the [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1779"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1779"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1779\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1780"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}