Home Tags Technical Briefs

Tag: Technical Briefs

AWS RDS instances should not be present in public subnet

Cloud security refers to a set of policies, technologies or controls that are used to protect data, applications and associated infrastructure. Talking of security...
Amazon-CloudTrail-Logs-Configuration-CloudWatch-AWS-Security

Why CloudTrail logs should be configured in CloudWatch?

Cloud services are used to store confidential data which raises security concerns. Enterprises want to ensure that their data is always accessible as well...

Amazon EC2 auto-scaling groups should be configured properly

Amazon EC2 auto-scaling groups play an important role and contribute significantly to the scalability of your cloud infrastructure. If auto-scaling groups are not configured...

AWS Lambda cost by function – Keep tabs on your ever-increasing...

Cost visibility is the topmost priority of all the organizations using cloud resources. Minimizing the cost remains the primary goal for all the organizations....
Amazon-RDS-Backup-Retention-Period_Fault-Tolerance

Ensure that your Amazon RDS backup retention period is set up

Fault tolerance enables your cloud infrastructure to continue functioning properly in the event of one or multiple failures within the cloud components. In simpler...

Analyze Amazon EC2 instances with low CPU utilization

Cost optimization refers to following certain techniques to bring down cloud expenditure. Organizations do not prefer to spend unnecessarily on cloud resources which are...

AWS EBS cost by family – Monitor costs incurred by every...

Cost visibility is one of the key areas which is deeply observed and analyzed by most of the organizations. This is because minimizing the...
AWS-Config_Metric-Filters-&-Alarms_Cloud-Security

Enabling AWS Config monitoring and alarms

What is AWS Config? AWS Config is a service that allows you to evaluate, audit and assess your AWS resources. Through AWS Config, you can...
AWS-Redshift-Cluster-Encryption_KMS-CMKs

AWS Redshift clusters should be encrypted with KMS CMKs

Cloud security refers to a set of policies, technologies or controls required to protect data, applications and associated infrastructure. Organizations want their deployed resources...
MFA_Multi-Factor-Authentication

How to track sign-ins without MFA (Multi-Factor Authentication)

In the 21st century, the era of mobilization and the internet, we are always in search of new ways to secure our privacy and...