Tag: Technical Briefs
AWS RDS instances should not be present in public subnet
Cloud security refers to a set of policies, technologies or controls that are used to protect data, applications and associated infrastructure. Talking of security...
Why CloudTrail logs should be configured in CloudWatch?
Cloud services are used to store confidential data which raises security concerns. Enterprises want to ensure that their data is always accessible as well...
Amazon EC2 auto-scaling groups should be configured properly
Amazon EC2 auto-scaling groups play an important role and contribute significantly to the scalability of your cloud infrastructure. If auto-scaling groups are not configured...
AWS Lambda cost by function – Keep tabs on your ever-increasing...
Cost visibility is the topmost priority of all the organizations using cloud resources. Minimizing the cost remains the primary goal for all the organizations....
Ensure that your Amazon RDS backup retention period is set up
Fault tolerance enables your cloud infrastructure to continue functioning properly in the event of one or multiple failures within the cloud components. In simpler...
Analyze Amazon EC2 instances with low CPU utilization
Cost optimization refers to following certain techniques to bring down cloud expenditure. Organizations do not prefer to spend unnecessarily on cloud resources which are...
AWS EBS cost by family – Monitor costs incurred by every...
Cost visibility is one of the key areas which is deeply observed and analyzed by most of the organizations. This is because minimizing the...
Enabling AWS Config monitoring and alarms
What is AWS Config?
AWS Config is a service that allows you to evaluate, audit and assess your AWS resources. Through AWS Config, you can...
AWS Redshift clusters should be encrypted with KMS CMKs
Cloud security refers to a set of policies, technologies or controls required to protect data, applications and associated infrastructure. Organizations want their deployed resources...
How to track sign-ins without MFA (Multi-Factor Authentication)
In the 21st century, the era of mobilization and the internet, we are always in search of new ways to secure our privacy and...