Guide to Container Management on AWS

Guide to Container Management on AWS

Container management aims to help you create, govern, and maintain your containers. There are tools and services in the market that enable automation of the creation, deployment, maintenance, scaling, and monitoring of application or system containers. Container management in the context of AWS is about understanding the AWS services and options that abstract aspects of managing cloud or on-prem infrastructure, security, scalability, and high availability of your services. Collectively, these container management services enable you…

Read More

When and How to Use AWS Graviton

When and How to Use AWS Graviton

Announced in 2018, AWS Graviton is a line of processors specifically developed for cloud applications that run at scale. Currently the largest hyper-scaler in the world, AWS continues to develop and launch new services for its customers. This includes introducing EC2-A1 instance-supporting processors for client workloads that use Azure DevOps Services (ARM) instructions. This led AWS to release Graviton2, giving customers as sizable increase in performance at a better price—40% lower than comparable x86-based instances….

Read More

How the MITRE ATT&CK Framework Enhances Cloud Security

How the MITRE ATT&CK Framework Enhances Cloud Security

MITRE ATT&CK™ is a framework consisting of several tactics to help businesses regain control of their security systems. ATT&CK—short for adversarial tactics, techniques, and common knowledge—is a knowledge base consisting of the different strategies adversaries use to exploit your systems based on observations of real cyber attacks. MITRE launched the framework in 2013 to “document common TTPs that advanced persistent threats use against Windows enterprise networks.” The corporation gathered information on the various threats plaguing…

Read More

Common Cloud-Native Security Misconfigurations & Solutions

Common Cloud-Native Security Misconfigurations & Solutions

Cloud configuration errors are a significant concern for stakeholders invested in modern DevOps processes, thanks to the quantity of cloud-native software used in production environments these days (think of microservices, as well as serverless and containerized workloads such as Kubernetes). Misconfigured cloud environments can result in everything from poor performance, to system downtime, to data breaches. Cloud-native architectures mean the introduction of new attack surfaces. Complex architectures with various network stack components can be involved…

Read More

Simplify with Network Security as a Service (NSaaS)

Simplify with Network Security as a Service (NSaaS)

Digital transformation has changed from being an IT buzzword to a commonly used term. Over the past two years, interest in digital transformation has surged because of the increased dependence on remote working models resulting from the COVID-19 pandemic. Shifting an organization’s applications and data to the cloud introduces numerous benefits, such as reducing operational costs and increasing competitive advantages. However, it also expands an organization’s cyber attack surface and makes them more vulnerable to…

Read More

Unlocking Serverless with AWS Lambda and IAM

Unlocking Serverless with AWS Lambda and IAM

As I mentioned earlier we find the code for our two Lambda functions create-user and get-user under their respective folders. import jsonimport boto3import os client = boto3.client(‘dynamodb’) table_name = os.getenv(“TABLE_NAME”) def handler(event, _):   body = json.loads(event[‘body’])    data = client.put_item(     TableName=table_name,     Item={        ‘id’: {          ‘S’: body[‘id’]        },        ‘name’: {          ‘S’: body[‘name’]        }   })response…

Read More

6 AWS Sustainability Pillar Principles

6 AWS Sustainability Pillar Principles

What is the Sustainability Pillar? The latest addition to the AWS Well-Architected Framework aims to help you use environmental best practices for cloud computing. By following the six design principles and architectural best practices, organizations will be able to improve their carbon footprint while balancing cost, security, agility, reliability, and operational excellence. Sustainability in the cloud Sustainability is a hot topic. By moving to the AWS Cloud, your company is already reducing its carbon footprint….

Read More

Detect Azure AD Hybrid Cloud Vulnerabilities

Detect Azure AD Hybrid Cloud Vulnerabilities

Detect Azure AD Hybrid Cloud Vulnerabilities Workload Security AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 – learn how to protect against their common vulnerabilities. By: Jiri Sykora, Sunil Bharti May 19, 2022 Read time:  ( words) What is AADInternals? AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365. As the name suggest it deals with…

Read More

Cloud Configuration Management: Add These Guardrails After Launch

Cloud Configuration Management: Add These Guardrails After Launch

The Challenge With a brand-new account, your initial configuration sets the tone. With existing accounts, the challenge is twofold. The first is the team working with that account will already be used to operating under the existing configuration. And since they’ve been doing it this way for a while and things are working, there’s no motivation to change. The second challenge is on the technical side. Can these guardrails be implemented without breaking anything inside…

Read More

How to Optimize Your Lambda Code

How to Optimize Your Lambda Code

This code worked well in our tests and was approved in the code review process. It returns True when there are two files with the right prefixes, and it returns False when there isn’t. Simple enough. That wasn’t what happened in real life, however. It would still work in the scenario where the right files are there, but it would, only sometimes, return True when just one of the files were there. And this was…

Read More
1 2