Tag: Technical Briefs
Securing Amazon DynamoDB with Server Side Encryption (SSE)
Your Amazon DynamoDB containing sensitive data might be leaked or manipulated if there are no measures taken to ensure that it is secure. It...
Amazon EC2 instances should have termination protection enabled
There are multiple aspects and factors that can impact the security posture of your Amazon EC2 instances. In order to ensure that they are...
AWS RDS instances with mis-configured security groups attached
It is advised that security groups should be associated and configured appropriately with your AWS RDS instances which will make your cloud environment more...
Virtual Private Network (VPN) – How to track configuration changes
AWS Virtual Private Cloud (VPC) is a commercial cloud-based service for enterprise customers who prefer to run their workloads in the private cloud. It...
Amazon CloudTrail integration into CloudWatch is a security best practice
Amazon CloudTrail and CloudWatch are two security pillars of your cloud. Majorly they must maintain logs, create metrics of sign-ins and notify the subscribed...
CloudTrail log data encryption using Key Management Service (KMS)
Do you know the security and manual management of CloudTrail logs with your CMKs can be easier than ever before? AWS delivers your CloudTrail...
Delete unassociated AWS EBS volumes to optimize your cloud costs
Cost optimization refers to bringing down cloud expenditure by optimizing your cloud consumption. Any organization, whether big or small does not prefer to spend...
IAM roles for EC2 instances – A secure way to access...
Due to dynamic service infrastructure, complex configurations and various inter-dependencies of resources in cloud, it becomes quite important to put your security engine in...
AWS IAM users for access control on your cloud resources
Security solutions built for cloud can bring benefits for businesses as compared to using legacy on-premises security solutions. Legacy security approaches also require a...
AWS IAM accounts with MFA enabled at user level
Having a well thought out cloud security strategy is the key to getting ahead in the cloud game. Security solutions built for cloud can...