Articles by Tag #awssecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Secure Your AWS Pipeline: Step-by-Step Guide to VPC Integration-part 2

Welcome back! I hope you still have an appetite for learning more about CICD and how to...

Learn More 8 0Mar 20

IAM Deep Dive: AWS Security SCS-C02 Exam Prep 1

** 1. What is Identity and Access Management? ** A service/system that protects your...

Learn More 5 1Sep 29 '24

Multi-Factor Authentication (MFA) on AWS: A Critical Security Measure

Security threats are evolving, and traditional authentication methods are no longer enough to protect...

Learn More 4 0Mar 15

AWS TRANSIT GATEWAY

Transit Gateway Transit Gateway, introduced in 2018, helps manage multiple VPCs and connect AWS to...

Learn More 3 0Dec 7 '24

Politica para forzar la configuracion de Multifactor de autenticación en usuarios IAM de AWS.

La autenticación multifactor (MFA) es una capa adicional de seguridad para tus cuentas de AWS....

Learn More 3 0Aug 3 '24

A Beginner’s Guide to AWS WAF: Sample Project

Quick Guide: Configuring AWS WAF and ELB with a Practical Example In this blog, we will walk through...

Learn More 2 0May 17

Building Robust Security, Identity, & Compliance Frameworks in AWS

Effective security, identity, and compliance strategies are essential for safeguarding cloud...

Learn More 1 0Jan 13

Intro to AWS Resource Control Policies (RCPs)

AWS recently announced Resource Control Policies (RCPs) as part of pre:Invent (announcement was made...

Learn More 1 0Feb 4

Fortalece la Seguridad de tu AWS: Implementación de MFA para Usuarios IAM

La seguridad en la nube es primordial, y la autenticación multifactor (MFA) es una herramienta...

Learn More 1 1Aug 3 '24

Protect nginx ingress with AWS WAF and AWS Shield

I have The application running in AWS EKS. The application frontend is exposed to the...

Learn More 0 0Dec 9 '24

🔐 Zero Trust: The Future of Cloud Security

Traditional security is broken—static credentials, over-permissioned IAM roles, and VPN-based access...

Learn More 0 0Mar 15

Best Practices for Securing an AWS Environment

A Hands-On Guide to Locking Down Your AWS Cloud with Industry-Backed Security...

Learn More 0 0Jun 10

Abuse OpenID Connect and GitLab for AWS Access.

What is an OpenID Connect (OIDC)? This is an authentication protocol built on top of OAuth...

Learn More 0 0Apr 10

DevSecOps Maturity Model: Benchmarking AWS Security Practices

Introduction As modern software development and IT infrastructures continue to evolve, security is...

Learn More 0 0Dec 8 '24

Detecting and Mitigating Threats with AWS Security Hub and GuardDuty.

In today’s digital age, where attacks can be automated, the battle against evolving cyber threats...

Learn More 0 0Jan 10

AWS Certificate Manager (ACM): An In-Depth Overview

Introduction AWS Certificate Manager (ACM) is a managed service that simplifies handling...

Learn More 0 0Feb 22