Ena Vaghelaenna.hashnode.dev·Jul 24, 2024Security Automation in AWS: A New Era of Digital DefenseIn today's digital age, the proliferation of data and the increasing sophistication of cyber threats have made security a paramount concern for organizations worldwide. As businesses migrate to the cloud, securing their environments becomes even more...DiscussAWS
Ikoh Sylvaikohsylva.hashnode.dev·Jul 17, 2024Unveiling AWS Inspector: The Unstoppable Cyber Sentinel - Mastering Vulnerability Assessment with Cloud OmniscienceToday, we embark on a journey that shall illuminate the inner workings of AWS Inspector, equipping you with the knowledge and strategies to harness its power and elevate your vulnerability assessment capabilities to new heights of dominance. Brace yo...DiscussAWS
Chandra Prakash Reddydevopstour.hashnode.dev·Jul 10, 2024AWS Virtual Private Cloud ( AWS VPC ) { Part - I }Introduction A virtual private cloud (VPC) is a virtual network that mirrors a traditional data center network, utilizing AWS's scalable infrastructure. A VPC serves as a virtual data center network within AWS for a single client. It is logically ...DiscussAWS TourAWS VPC
Chandra Prakash Reddydevopstour.hashnode.dev·Jul 8, 2024AWS Network & Security { Part - IV }What is a Key Pairs in AWS EC2 Definition : A key pair in AWS EC2 is a set of security credentials used to authenticate access to EC2 instances. Components : It consists of a public key and a private key. Purpose : The key pair ensures that only a...DiscussAWS TourAWS
David Akumablog.davidakuma.com·Jul 6, 2024Threat Modeling - Understanding your system's security postureSoftware systems are designed to withstand attacks, which can only be achieved by a proper knowledge of the breadth and length of your system's attack surface area. When building on a cloud platform like AWS, there are guidelines and best practices i...Discuss·31 readsCloud EngineeringAWS sra
Jasai Hansdajasaiblogs.hashnode.dev·Jun 25, 2024Security in VPC: Understanding NACLs and Security Groups in AWSWhen working with AWS (Amazon Web Services), managing the security of your network is crucial. Two primary tools for this purpose are Network Access Control Lists (NACLs) and Security Groups (SGs). Both serve as firewalls but operate at different lev...DiscussAWS Cloud Practitioner EssentialsAWS Cloud Practitioner
Infraboyinfraboy.hashnode.dev·Jun 25, 2024Understanding Identity and Access Management (IAM)Identity and Access Management (IAM) Identity and Access Management (IAM) is a framework of policies and technologies for ensuring that the right individuals have the appropriate access to technology resources. IAM systems fall under the overarching ...DiscussAWS ( Amazon Web Service )IAM
Chandra Prakash Reddydevopstour.hashnode.dev·Jun 11, 2024AWS Network & Security { Part - II }What is an Elastic IP? An Elastic IP is a static IPv4 address designed for dynamic cloud computing in Amazon Web Services (AWS). Unlike regular IP addresses, which can change if you restart your instance, an Elastic IP remains constant, allowing you ...Discuss·37 readsAWS TourAWS
Neel Patelneelpatel16.hashnode.dev·Jun 11, 2024Day 25: AWS SecurityAmazon Macie Macie is a fully managed service that continuously monitors S3 data access activity for anomalies, and generates detailed alerts when it detects risk of unauthorized access or inadvertent data leaks. Macie works by uses Machine Learnin...DiscussAWS
Adedamola Ajiboladamolaaji.hashnode.dev·Jun 10, 2024Demystifying AWS Security: IAM Password Policies vs. Automated Access Key RotationAre you new to managing security in your AWS environment? Navigating the intricacies of AWS Identity and Access Management (IAM) can be overwhelming, especially when it comes to ensuring strong security practices. In this beginner-friendly blog post,...DiscussIAM