Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Nov 28, 2023Creating Security group using TerraformIntroduction: Security groups are a vital part of securing your cloud infrastructure, as they allow you to control inbound and outbound traffic to your virtual machines. #Amazon Web Services (AWS) provides a #security group service that allows you to...DiscussAWS
ADITYA PAWARaditya-pawar.hashnode.dev·Jul 18, 2023Databases in AWSAWS (Amazon Web Services) offers a variety of managed database services to meet different application requirements. These managed database services handle administrative tasks, such as setup, patching, backups, and scaling, allowing developers to foc...Discuss·10 likes·48 readsAWS Database
Christian Emenikeblog.ccemenike.me·Jul 17, 2023Playing by the RulesHello, cloud enthusiasts! Just to start. Thanks for taking the time to read this, I appreciate you always. If you are planning to use the Cloud, especially with AWS or already using it, there is a particular rule that most people tend to ignore or fo...DiscussAWS
Chandrasekar(Chan) Rajaramcr88.hashnode.dev·Jul 9, 2023Monitoring Security Group Changes in AWS Organizations using CloudTrail, CloudWatch, and SNS1. Introduction Security is a paramount concern when managing AWS resources, especially when handling changes to Security Groups within an organization. This article provides insights into how to monitor these changes using AWS CloudTrail, AWS CloudW...Discussawssecurity
Idris Adenijialvacoder.hashnode.dev·Jun 30, 2023AWS Security Best Practices: Safeguarding Your Cloud EnvironmentIn the rapidly evolving digital landscape, ensuring the security of cloud resources has become paramount for organizations. With the increasing adoption of cloud technology, businesses must enhance their conventional IT strategies to confront the eme...DiscussSecurity
Jenna's Runbooksblog.jennasrunbooks.com·Apr 13, 2023AWS Access Key rotation for IAM Users | Boto3 ScriptOverview Rotate your AWS API access keys using this Boto3 script for IAM users that I wrote. Optional arguments include create, update, delete, and list access keys. When applying the create new 🔑 feature, the user is prompted whether or not to over...Discuss·358 readsAWSAWS
Sankita MandalforWomen in Cloud Nativeblog.womenincloudnative.com·Mar 20, 2023All you need to know about AWS IAM - Part 1AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. With IAM, you can centrally manage permissions that control which AWS resources users can access. You use IAM to control who is authent...Discuss·96 readsAWS
Jineshkumar Patelblog.jineshkumar.com·Dec 10, 2022Keep Your Amazon S3 Buckets Secure: Top Tips and Best PracticesIntroduction Amazon S3 (Simple Storage Service) is a cloud storage service provided by Amazon Web Services (AWS). S3 buckets are used to store and manage data in the cloud. S3 provides a simple and highly scalable way to store and retrieve large amou...Discuss·46 readsAmazon S3
Prakashprakashvb.hashnode.dev·Nov 19, 2022Cloud CustodianCloud Custodian is an open-source tool developed by Capital One that helps organizations manage their cloud infrastructure and resources using policies. With Cloud Custodian, users can define policies that automatically enforce compliance, security, ...Discuss·30 readsAWS
Stenio Nogueira Loureiro Juniorstech.hashnode.dev·Sep 2, 2022AWS Secrets ManagerO AWS Secrets Manager ajuda no armazenamento e proteção de segredos que podem ser senhas, chaves de API e outros dados sensíveis. Ao utilizar o Secrets Manager é possível recuperar segredo de forma programática, por meio de chamadas de API, evitando ...Discuss·76 readsAWS