How to Achieve Fine-Grained Control with AWS Organizations

10Dec,18 Post Image

In the beginning, there was nothing but the default VPC Your single default Amazon Virtual Private Cloud (Amazon VPC) might be a good way to start prototyping, but depending on the workloads you are managing, it can easily get complex and may require a lot of manual work on your part. In this blog, we’ll […]

View Post

How to Secure Your Web Apps Using AWS Web Application Firewall

20Nov,18 Post Image

Security is a big concern for web applications, especially when they’re used globally. When an asset is public, it’s prone to different kinds of attacks from different hackers. Unfortunately, sometimes developers or organizations don’t focus on securing their web apps from common exploits, or they invest so much time and resource in security that product […]

View Post

Using the AWS Well-Architected Framework to Support DevSecOps

20Nov,18 Post Image

How to apply guidelines from the AWS Well-Architected Framework to make it easier to prioritize security and advance your DevSecOps approach. nOps cloud management for AWS is an easy-to-use SaaS tool that enables DevOps teams to create customized security profiles to identify and support remediation of security violations … Read more: https://www.nops.io/blog/aws-well-architected-framework-security-devsecops

View Post

How to Reduce Your Docker Image Size for Better Caching and Faster Build & Deploy

08Oct,18 Post Image

Container-based infrastructures are among the hottest cloud computing solutions today. What’s driving the excitement is the ability of containers to make application deployments more manageable, versionable, and faster. That’s why it’s so important to have the most optimal Docker images. Here at nClouds, DevOps is a major focus, and we build CI/CD pipelines for many […]

View Post

Get Well-Architected. 6 steps to removing inactive AWS keys now.

12Feb,18 Post Image

This blog kicks off a series in which we’ll address topics aligned with the AWS Well-Architected Framework. If you were at AWS re:Invent, you probably heard AWS CTO Werner Vogels talk about well-architected cloud architecture. The AWS Well-Architected Framework provides a consistent approach and guidance to evaluate architectures and implement scalable designs, with a focus […]

View Post

How to use Chef to automate your KMS encryption process

17May,17 Post Image

Since its inception in 2009, Chef has quickly become the go-to configuration management tool for developers and companies. While the tool is highly successful at streamlining the tasks of configuring and maintaining a company’s servers, handling sensitive data within Chef continues to be a bit of a challenge. For companies that are dealing with extremely […]

View Post

OpenVPN + OpenLDAP + Yubikey

08Mar,16 Post Image

Overview As AWS managed services providers, we know that security is sometimes characterized as the balance of security and convenience. More times than not, for startups, security best practices suffer. We have simplified a solution to one of the most common infrastructure requirements: remote access. Using open source tools and a great MFA token we […]

View Post

How to Attach Policy to IAM User

31Jan,16 Post Image

In this blog post we show how to attach policy to an IAM user to manage the AWS resources usage and permissions, you will have to create an IAM user first if don’t know how to do that then read our previous post To attach policy to IAM user follow these steps: 1) Sign in […]

View Post

How to Create an IAM User in AWS Management Console

31Jan,16 Post Image

In this blog post we show how to create an IAM user in your AWS management console and how to generate the AWS key for that user. To create an IAM user follow these steps: 1) Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/ or click on the Identity […]

View Post

Permitting IAM users to manage MFA and password without giving admin rights

04Sep,15 Post Image

When we are building infrastructure for our clients, we make sure that user has least amount of privileges. This walk though guide you through giving user enough permissions to manage their MFA and password without giving them admin rights. 1. Navigate to IAM and click on create policy and select Create Your Own Policy 2. […]

View Post

AWS Cross-account service access with Roles and temp keys

In last week, I was playing with cross-account IAM roles to achieve key-less job executions in our amazon web services environment. As a security prospective, IAM role is better option over aws keys as there is no need of aws keys ,awscli or s3cmd to access aws services. With proper use of IAM roles in […]

View Post

Subscribe to Our Newsletter

Join our community of DevOps enthusiast - Get free tips, advice, and insights from our industry leading team of AWS experts.