How to use Chef to automate your KMS encryption process

17May,17 Post Image

Since its inception in 2009, Chef has quickly become the go-to configuration management tool for developers and companies. While the tool is highly successful at streamlining the tasks of configuring and maintaining a company‚Äôs servers, handling sensitive data within Chef continues to be a bit of a challenge. For companies that are dealing with extremely […]

View Post

OpenVPN + OpenLDAP + Yubikey

08Mar,16 Post Image

Overview As AWS managed services providers, we know that security is sometimes characterized as the balance of security and convenience. More times than not, for startups, security best practices suffer. We have simplified a solution to one of the most common infrastructure requirements: remote access. Using open source tools and a great MFA token we […]

View Post

Permitting IAM users to manage MFA and password without giving admin rights

04Sep,15 Post Image

When we are building infrastructure for our clients, we make sure that user has least amount of privileges. This walk though guide you through giving user enough permissions to manage their MFA and password without giving them admin rights. 1. Navigate to IAM and click on create policy and select Create Your Own Policy 2. […]

View Post

AWS Cross-account service access with Roles and temp keys

In last week, I was playing with cross-account IAM roles to achieve key-less job executions in our amazon web services environment. As a security prospective, IAM role is better option over aws keys as there is no need of aws keys ,awscli or s3cmd to access aws services. With proper use of IAM roles in […]

View Post

Subscribe to Our Newsletter

Join our community of DevOps enthusiast - Get free tips, advice, and insights from our industry leading team of AWS experts.