-
Best Practices for Deploying AWS DevOps Agent in Productionby Greg Eppel on January 28, 2026 at 10:36 pm
Root cause analysis during incidents is one of the most time-consuming and stressful parts of operating cloud applications. Engineers must quickly correlate telemetry data across multiple services, review deployment history, and understand complex application dependencies—all while under pressure to restore service. AWS DevOps Agent changes this paradigm by bringing autonomous investigation capabilities to your operations
-
Managing IP address exhaustion for Amazon RDS Proxyby Praney Mahajan on January 28, 2026 at 5:57 pm
In this post, you will learn how to address IP address exhaustion challenges when working with Amazon RDS Proxy. For customers experiencing IP exhaustion with RDS Proxy, migrating to IPv6 address space can be an effective solution if your workload supports IPv6. This post focuses on workloads that cannot support IPv6 address space and provides an alternative approach using IPv4 subnet expansion. The solution focuses on expanding your Amazon Virtual Private Cloud (Amazon VPC) CIDR range, establishing new subnets, and executing a carefully planned switching of your proxy to a new subnet configuration.
-
AWS CloudFormation 2025 Year In Reviewby Idriss Laouali Abdou on January 28, 2026 at 1:08 am
AWS CloudFormation enables you to model and provision your cloud application infrastructure as code-base templates. Whether you prefer writing templates directly in JSON or YAML, or using programming languages like Python, Java, and TypeScript with the AWS Cloud Development Kit (CDK), CloudFormation and CDK provide the flexibility you need. For organizations adopting multi-account strategies, CloudFormation
-
Choosing the right code page and collation for migration from mainframe Db2 to Amazon RDS for Db2by Vikram Khatri on January 27, 2026 at 6:56 pm
In this post, you learn how to select the appropriate code page and collation sequence when migrating from Db2 mainframe (z/OS) to Amazon RDS for Db2 on Linux. You explore the differences between mainframe CCSIDs and Db2 LUW code pages, understand character compatibility requirements, and discover how to prevent data truncation and maintain consistent sorting behavior across platforms.
-
File integrity monitoring with AWS Systems Manager and Amazon Security Lakeby Adam Nemeth on January 27, 2026 at 6:21 pm
Customers need solutions to track inventory data such as files and software across Amazon Elastic Compute Cloud (Amazon EC2) instances, detect unauthorized changes, and integrate alerts into their existing security workflows. In this blog post, I walk you through a highly scalable serverless file integrity monitoring solution. It uses AWS Systems Manager Inventory to collect
-
Enhance the visibility of Amazon RDS instances and configuration with AWS Config and Amazon Quick Suiteby Navya Arora on January 27, 2026 at 5:41 pm
In this post, we show you how to build a centralized dashboard for monitoring Amazon RDS configurations across your organization by using AWS Config and Amazon Quick Suite. This solution delivers detailed insights across different areas, such as summary metrics, backup configurations, security posture, engine and support information, extended configurations, and resource tagging.
-
Analyze JSON data efficiently with Amazon Redshift SUPERby Ezat Karimi on January 27, 2026 at 5:38 pm
Amazon Redshift transforms how organizations analyze JSON data by combining the analytical power of a columnar data warehouse with robust JSON processing capabilities. By using Amazon Redshift SUPER datatype, you can efficiently store, query, and analyze complex hierarchical data alongside traditional structured data without sacrificing performance. This post focuses on JSON features of Amazon Redshift.
-
Strategies for upgrading Amazon Aurora PostgreSQL and Amazon RDS for PostgreSQL from version 13by Abhimanyu Tomar on January 27, 2026 at 5:36 pm
In this post, we help you plan your upgrade from PostgreSQL version 13 before standard support ends on February 28, 2026. We discuss the key benefits of upgrading, breaking changes to consider, and multiple upgrade strategies to choose from.
-
IAM Identity Center now supports IPv6by Suchintya Dandapat on January 26, 2026 at 8:17 pm
Amazon Web Services (AWS) recommends using AWS IAM Identity Center to provide your workforce access to AWS managed applications—such as Amazon Q Developer—and AWS accounts. Today, we announced IAM Identity Center support for IPv6. To learn more about the advantages of IPv6, visit the IPv6 product page. When you enable IAM Identity center, it provides
-
Building Zero Trust Access Across Multi-Account AWS Environmentsby Keith Lee on January 26, 2026 at 7:27 pm
Security teams managing multi-account Amazon Web Services (AWS) environments face significant operational challenges when implementing consistent access controls. Traditional approaches necessitate duplicating VPN infrastructure, managing separate bastion hosts in each account, and maintaining fragmented security policies across multiple applications. This operational overhead increases infrastructure costs and attack surfaces. This post walks you through implementing AWS
-
Modernizing financial networks: Huatai Securities’ multicast implementation on AWSby Kevin on January 26, 2026 at 7:14 pm
Modernizing financial networks: Huatai Securities’ multicast implementation on AWS Note: This post is published in collaboration with Zhonghai Hu, Senior Architect at Huatai Securities and Ricky Chu, Infrastructure Project Manager, at Huatai Financial Holdings (Hong Kong). Huatai Securities Co., Ltd., a technology-driven securities group founded in 1991, is committed to transforming China’s securities industry through
-
Automate prefix lists with Amazon VPC IP Address Manager (IPAM)by Rizwan Mushtaq on January 26, 2026 at 7:09 pm
In this post, we examine the ability for Amazon VPC IP Address Manager (IPAM) to automate prefix lists updates with prefix list resolver. This new feature uses the IPAM database to generate groups of IP addresses based on connectivity requirements and automates connectivity configurations by propagating IP addresses to Amazon Web Services (AWS) resources, such
-
Updated PCI PIN compliance package for AWS CloudHSM now availableby Tushar Jain on January 26, 2026 at 6:11 pm
Amazon Web Services (AWS) is pleased to announce the successful completion of Payment Card Industry Personal Identification Number (PCI PIN) audit for the AWS CloudHSM service. With CloudHSM, you can manage and access your keys on FIPS 140-3 Level 3 validated hardware, protected with customer-owned, single-tenant hardware security module (HSM) instances that run in your
-
AWS Weekly Roundup: Amazon EC2 G7e instances, Amazon Corretto updates, and more (January 26, 2026)by Micah Walter on January 26, 2026 at 4:25 pm
Hey! It’s my first post for 2026, and I’m writing to you while watching our driveway getting dug out. I hope wherever you are you are safe and warm and your data is still flowing! This week brings exciting news for customers running GPU-intensive workloads, with the launch of our newest graphics and AI inference
-
Monitoring Amazon EFS KPIs using Amazon CloudWatch metricsby Samyak Kathane on January 23, 2026 at 11:37 pm
Operational excellence isn’t just about efficiency—it’s about delivering consistent availability when customers need it most. Achieving this requires sophisticated, real-time monitoring that tracks key system metrics and storage insights, such as throughput patterns, IOPS utilization, I/O characteristics, and storage distribution. This visibility enables teams to resolve issues proactively, right-size resources, optimize workload placement, and plan
-
Updated PCI PIN compliance package for AWS Payment Cryptography now availableby Tushar Jain on January 23, 2026 at 11:14 pm
Amazon Web Services (AWS) is pleased to announce the successful completion of Payment Card Industry Personal Identification Number (PCI PIN) audit for the AWS Payment Cryptography service. With AWS Payment Cryptography, your payment processing applications can use payment hardware security modules (HSMs) that are PCI PIN Transaction Security (PTS) HSM certified and fully managed by
-
AWS achieves 2025 C5 Type 2 attestation report with 183 services in scopeby Tea Jioshvili on January 23, 2026 at 9:39 pm
Amazon Web Services (AWS) is pleased to announce a successful completion of the 2025 Cloud Computing Compliance Criteria Catalogue (C5) attestation cycle with 183 services in scope. This alignment with C5 requirements demonstrates our ongoing commitment to adhere to the heightened expectations for cloud service providers. AWS customers in Germany and across Europe can run
-
AWS renews the GSMA SAS-SM certification for two AWS Regions and expands to cover four new Regionsby Michael Murphy on January 23, 2026 at 8:47 pm
Amazon Web Services (AWS) is pleased to announce the expansion of GSMA Security Accreditation Scheme for Subscription Management (SAS-SM) certification to four new AWS Regions: US West (Oregon), Europe (Frankfurt), Asia Pacific (Tokyo), and Asia Pacific (Singapore). Additionally, the AWS US East (Ohio) and Europe (Paris) Regions have been recertified. All certifications are under the
-
Exploring common centralized and decentralized approaches to secrets managementby Brendan Paul on January 23, 2026 at 7:15 pm
One of the most common questions about secrets management strategies on Amazon Web Services (AWS) is whether an organization should centralize its secrets. Though this question is often focused on whether secrets should be centrally stored, there are four aspects of centralizing the secrets management process that need to be considered: creation, storage, rotation, and
-
Applying Amazon S3 Object Lock at scale for petabytes of existing databy Omkar Deshmane on January 23, 2026 at 7:08 pm
Organizations with petabytes of data in the cloud need a way to apply immutable storage protections to data that’s already been stored—whether for regulatory compliance or cyber resilience. Although you can enable write-once-read-many (WORM) controls for newly created storage, applying these protections to existing enterprise data at scale requires a systematic approach. Regulated industries have
