Get Well-Architected. 6 steps to removing inactive AWS keys now.

12Feb,18 Post Image

This blog kicks off a series in which we’ll address topics aligned with the AWS Well-Architected Framework. If you were at AWS re:Invent, you probably heard AWS CTO Werner Vogels talk about well-architected cloud architecture. The AWS Well-Architected Framework provides a consistent approach and guidance to evaluate architectures and implement scalable designs, with a focus […]

View Post

How to use Chef to automate your KMS encryption process

17May,17 Post Image

Since its inception in 2009, Chef has quickly become the go-to configuration management tool for developers and companies. While the tool is highly successful at streamlining the tasks of configuring and maintaining a company’s servers, handling sensitive data within Chef continues to be a bit of a challenge. For companies that are dealing with extremely […]

View Post

OpenVPN + OpenLDAP + Yubikey

08Mar,16 Post Image

Overview As AWS managed services providers, we know that security is sometimes characterized as the balance of security and convenience. More times than not, for startups, security best practices suffer. We have simplified a solution to one of the most common infrastructure requirements: remote access. Using open source tools and a great MFA token we […]

View Post

Permitting IAM users to manage MFA and password without giving admin rights

04Sep,15 Post Image

When we are building infrastructure for our clients, we make sure that user has least amount of privileges. This walk though guide you through giving user enough permissions to manage their MFA and password without giving them admin rights. 1. Navigate to IAM and click on create policy and select Create Your Own Policy 2. […]

View Post

AWS Cross-account service access with Roles and temp keys

In last week, I was playing with cross-account IAM roles to achieve key-less job executions in our amazon web services environment. As a security prospective, IAM role is better option over aws keys as there is no need of aws keys ,awscli or s3cmd to access aws services. With proper use of IAM roles in […]

View Post

Subscribe to Our Newsletter

Join our community of DevOps enthusiast - Get free tips, advice, and insights from our industry leading team of AWS experts.