chandrashekarawsec2securitygroupsvpcnacls.hashnode.dev·Feb 1, 2025Exploring AWS EC2 Instances, Security Groups, NACLs and their Advantages Over On-premises SolutionsAmazon Web Services (AWS) has transformed the way businesses manage their IT infrastructure. Among its many services, Amazon EC2 (Elastic Compute Cloud) stands out as a cornerstone for scalable computing. In this blog, we’ll dive into two key topics:...AWS,EC2
AnkitforAnkit 's blogimankit.hashnode.dev·Jan 2, 2025Day 9: Monitoring and Logging in AWS with CloudWatch and CloudTrail 🌐🚀Welcome to Day 9 of our AWS learning journey! 🎉 Today, we’ll uncover the intricacies of monitoring and logging with two indispensable AWS services: Amazon CloudWatch and AWS CloudTrail. These tools are vital for ensuring the smooth operation, securi...Learning AWS from Scratch: A Day-by-Day GuideAWS
Shaileshshaileshpashte.hashnode.dev·Aug 4, 2024AWS Direct Connect and Direct Connect Gateway: A Comprehensive GuideIntroduction As businesses increasingly migrate to the cloud, secure and reliable connectivity between on-premises infrastructure and AWS becomes paramount. AWS Direct Connect and Direct Connect Gateway offer dedicated, high-speed, and secure connect...aws direct connect gateway
Sourav Chakrabortydevsecopssourav.hashnode.dev·Jul 6, 2024From Network to Application: Leveraging VM-Series Firewalls for Holistic Advanced Security on AWSAs businesses transition to cloud environments like AWS, protecting private web servers from evolving threats becomes crucial. Traditional security measures alone may not suffice in a dynamic cloud landscape. This blog explores deploying VM-series fi...#workmatescore2cloud
Rosecurifylog.rosecurify.com·Jun 29, 2024Seclog - #80📚 SecMisc The CloudSec Engineer - Resources and articles for cloud security engineers. - Read More Entities allowed between function calls - Shazzer - Analysis of security implications of entities allowed between function calls. - Read More 📰 S...seclogseclog
Shaileshshaileshpashte.hashnode.dev·Jun 15, 2024Day 6: IAM Roles⚙ for AWS Services - Look Over🔭Introduction IAM roles enable AWS services to interact securely with each other. Instead of using static long-term credentials, roles provide temporary security credentials for permissions. This ensures secure service-to-service communication, enhanc...awslearnig
Sourav Chakrabortydevsecopssourav.hashnode.dev·Apr 27, 2024From Metadata to Mayhem: Protecting AWS account from SSRF Attacks via IMDSV2Server-Side Request Forgery (SSRF) is a critical security vulnerability that allows attackers to manipulate a server into making unintended requests to internal or external systems. In this article, we explore the relationship between SSRF and the AW...ssrf
Vishnu Rachapuditechnodiaryvishnu.hashnode.dev·Apr 19, 2024Unveiling AWS Guard Duty: Your Guardian Angel for Cloud Threat DetectionIntroduction Amazon GuardDuty is a security monitoring service provided by AWS. It is designed to safeguard your AWS accounts, workloads, and data by continuously monitoring for potential threats across your AWS environment. GuardDuty analyzes and pr...AWS Security SeriesAWS
Stenio Nogueira Loureiro Juniorstech.hashnode.dev·Feb 9, 2024Melhores Práticas no AWS ConfigO AWS Config é um serviço poderoso da Amazon Web Services (AWS) que oferece recursos abrangentes para monitorar e gerenciar os recursos da sua infraestrutura na nuvem. Ele permite que você audite e avalie as configurações dos seus recursos, proporcio...AWS
Vyankateshwar Taikarvtaikar.hashnode.dev·Jan 1, 2024🔑Identity and Access Management (IAM) in AWS (Basics Concepts)🔑📌Introduction to IAM 🔑 Identity and Access Management (IAM) is an Amazon Web Services (AWS) service that allows you to securely manage access to AWS services and resources. This allows you to control who can do what (rights) and what resources they...34 readsIAM