Using the AWS Well-Architected Framework to Support DevSecOps

20Nov,18 Post Image

How to apply guidelines from the AWS Well-Architected Framework to make it easier to prioritize security and advance your DevSecOps approach. nOps cloud management for AWS is an easy-to-use SaaS tool that enables DevOps teams to create customized security profiles to identify and support remediation of security violations … Read more: https://www.nops.io/blog/aws-well-architected-framework-security-devsecops

View Post

How to Reduce Your Docker Image Size for Better Caching and Faster Build & Deploy

08Oct,18 Post Image

Container-based infrastructures are among the hottest cloud computing solutions today. What’s driving the excitement is the ability of containers to make application deployments more manageable, versionable, and faster. That’s why it’s so important to have the most optimal Docker images. Here at nClouds, DevOps is a major focus, and we build CI/CD pipelines for many […]

View Post

Get Well-Architected. 6 steps to removing inactive AWS keys now.

12Feb,18 Post Image

This blog kicks off a series in which we’ll address topics aligned with the AWS Well-Architected Framework. If you were at AWS re:Invent, you probably heard AWS CTO Werner Vogels talk about well-architected cloud architecture. The AWS Well-Architected Framework provides a consistent approach and guidance to evaluate architectures and implement scalable designs, with a focus […]

View Post

How to use Chef to automate your KMS encryption process

17May,17 Post Image

Since its inception in 2009, Chef has quickly become the go-to configuration management tool for developers and companies. While the tool is highly successful at streamlining the tasks of configuring and maintaining a company’s servers, handling sensitive data within Chef continues to be a bit of a challenge. For companies that are dealing with extremely […]

View Post

OpenVPN + OpenLDAP + Yubikey

08Mar,16 Post Image

Overview As AWS managed services providers, we know that security is sometimes characterized as the balance of security and convenience. More times than not, for startups, security best practices suffer. We have simplified a solution to one of the most common infrastructure requirements: remote access. Using open source tools and a great MFA token we […]

View Post

Permitting IAM users to manage MFA and password without giving admin rights

04Sep,15 Post Image

When we are building infrastructure for our clients, we make sure that user has least amount of privileges. This walk though guide you through giving user enough permissions to manage their MFA and password without giving them admin rights. 1. Navigate to IAM and click on create policy and select Create Your Own Policy 2. […]

View Post

AWS Cross-account service access with Roles and temp keys

In last week, I was playing with cross-account IAM roles to achieve key-less job executions in our amazon web services environment. As a security prospective, IAM role is better option over aws keys as there is no need of aws keys ,awscli or s3cmd to access aws services. With proper use of IAM roles in […]

View Post

Search Blog

Categories

Recent Posts

Subscribe to Our Newsletter

Join our community of DevOps enthusiast - Get free tips, advice, and insights from our industry leading team of AWS experts.