Armando ContrerasforArmando Contreras's team blogcoc-hashnode.monpasse.com·Mar 24, 2024AWS EC2 IMDS(Instance Metadata Service) all that you need to knowIn my detailed study of the AWS EC2 service, I came across a common configuration called IMDS, which stands for Instance Metadata Service. If you’ve launched an EC2 instance or created a launch template for an Autoscaling group, you’ve likely seen th...DiscussAWS
Mohamad MahmoodforHashNoteshashnotes.hashnode.dev·Mar 18, 2024Describe security services with the AWS cloudAWS (Amazon Web Services) offers a comprehensive set of security services and features to help customers protect their data, applications, and infrastructure in the cloud. Here are some key security services provided by AWS: AWS Identity and Access ...DiscussAmazon Web Services
AScribe Worxascribeworx.hashnode.dev·Mar 13, 2024AWS Security Groups: A Comprehensive GuideWhat is a security group? An AWS security group functions as a digital barrier, managing the flow of incoming and outgoing traffic to and from EC2 instances. It establishes a series of regulations that determine the types of network traffic permitted...Discussaws security
Trinayatrinaya.hashnode.dev·Mar 13, 2024AWS Security Group and NACL made easyAWS (Amazon Web Services) provides multiple layers of security to protect resources and data within its cloud infrastructure. Two important components for network security in AWS are Security Groups and Network Access Control Lists (NACLs). Let's exp...DiscussAWS
Alpheus Godswillalpheus.hashnode.dev·Mar 1, 2024Securing AWS Access and Monitoring Billing: A Comprehensive GuidePrerequisites: Access to an AWS Account with Administrative Privileges. Basic Understanding of AWS Services and Navigation in the AWS Management Console. Familiarity with IAM (Identity and Access Management) and Security Best Practices. Follow f...Discuss #MFAsetup
Mmesoma Okarokasnoma.hashnode.dev·Mar 1, 20245 Must-Have AWS Managed Config RulesYesterday while working with AWS Config, I came across some cool managed AWS Config rules and decided to share. Firstly, what is this AWS Config? AWS Config is a service in AWS that assesses, audits and evaluates the configurations of your resources....Discuss·49 readsAWS
Niranjan Gblog.securityinsights.io·Feb 24, 2024Security Best Practices for Amazon EC2Only use encrypted EBS volumes. Encrypt your data, snapshots, and disk I/O using the AWS KMS AES-256 algorithm. Activate your VPC Flow Logs. Collect IP traffic from and to the network interfaces in your VPCs for further analysis. Protect your EC2 Key...Discuss2FA for SSH
Sumit Mondalsumit007.hashnode.dev·Feb 23, 2024A Beginner's Guide to Using Amazon Macie in AWSIntroduction: In the vast world of AWS services, security is a top priority for businesses and individuals alike. Amazon Macie, a powerful security service, offers an easy and effective way to discover, classify, and protect sensitive data. In this b...Discuss·1 likeAWS - HandsOn2Articles1Week
Ridwan Ibrahimkodehacks.com·Feb 17, 2024Mastering AWS Onboarding: The Essential 4-Step GuideCloud computing, especially with AWS, can be a great way for startups to save money. But it's not always easy. In my three years as a cloud administrator, I've seen new and experienced developers make expensive mistakes. Whether you're a startup owne...Discuss·263 readsAWS
Er. Sahadev Dahitdahit.hashnode.dev·Feb 11, 2024IAM (Identity and Access Manager)First of all, let's know the following concept Authentication: The verification process to confirm the identity of a user or system, often involving credentials such as passwords, biometric data, or security tokens. Authorization: The subsequent st...Discuss·2 likes·26 readsAWS