Amazon MemoryDB now supports condition keys for user authentication and encryption in transit
Share
Services
Today, Amazon MemoryDB launched two new condition keys for IAM policies that enable you to control user authentication and encryption in transit settings during cluster creation. The new condition keys let you create IAM policies or Service Control Policies (SCPs) to enhance security and meet compliance requirements.
The first condition key called, memorydb:TLSEnabled, enables you to require a specific encryption in transit setting in your AWS Accounts. For example, you can use the new memorydb:TLSEnabled condition key to enforce that MemoryDB clusters can only be created with encryption in transit enabled. The second condition key called, memorydb:UserAuthenticationMode, enables you to enforce that MemoryDB users have a user authentication setting. For example, you can use the new memorydb:UserAuthenticationMode condition key to require that MemoryDB users have IAM authentication enabled.
Amazon MemoryDB condition keys are now available in all regions where MemoryDB is generally available. To learn more about using condition keys with MemoryDB, please refer to our [documentation](https://docs.aws.amazon.com/memorydb/latest/devguide/security%5Fiam%5Fservice-with-iam.html#security%5Fiam%5Fservice-with-iam-id-based-policies-conditionkeys).
What else is happening at Amazon Web Services?
Amazon CloudFront now supports additional log formats and destinations for access logs
in about 15 hours
Services
Share
Read update
Services
Share
Read update
Services
Share
AWS Application Load Balancer introduces header modification for enhanced traffic control and security
about 9 hours ago
Services
Share
Amazon EC2 G6e instances now available in additional regions
about 9 hours ago
Services
Share
Amazon CloudWatch Synthetics now supports Playwright runtime to create canaries with NodeJS
about 9 hours ago
Services
Share