Open in app

Sign In

Write

Sign In

Sudhir kumar
Sudhir kumar

14 Followers

Home

About

Pinned

How to implement AWS Security Best Practices ?

Highlighting a few important points regarding AWS Security. Applying best security practices is the most important aspect of running things in cloud. We can apply NIST cybersecurity framework five functions i.e. Identify, Protect, Detect, Respond, Recover. Always use Defense in Depth approach i.e. Protection at each layer. Example → Cloudfront…

AWS

12 min read

AWS Security Best Practices
AWS Security Best Practices
AWS

12 min read


6 days ago

What is DNS and how AWS Route53 resolver & Hybrid DNS works ?

This post will cover details about DNS Architecture, Route53 DNS, DNS Security and how to resolve on-premises DNS zones/records from AWS and Route53 private hosted zones from on-premises. Route53 Hybrid DNS is a powerful tool that enables you to efficiently manage your DNS infrastructure by combining both on-premises and cloud…

DNS

8 min read

What is AWS Route53 Resolver and how Hybrid DNS works ?
What is AWS Route53 Resolver and how Hybrid DNS works ?
DNS

8 min read


Feb 5

5 secure ways to connect AWS resources

How you access AWS resources from on-premises also define your security posture and cloud security principles. What is the best way to connect securely from on-premises OR local machine. Few questions to ask yourself :- Are bastion host security groups wide open ? What if SSH RSA pub/priv keypair is…

AWS

5 min read

5 secure ways to connect AWS resources
5 secure ways to connect AWS resources
AWS

5 min read


Jan 23

Reference guide to start AWS Security engineering journey

This post is related to folks with no cloud security experience and how can they get into this field. Below topics will help you become more knowledgeable in AWS security domain. Pursuing certifications is not mandatory but it does give an extra edge and you go extra mile to study…

AWS

4 min read

Reference guide to start AWS Security engineering journey
Reference guide to start AWS Security engineering journey
AWS

4 min read


Oct 7, 2022

13 best practices before deploying AWS S3 buckets in production

AWS S3 stands for Simple Storage Service. It’s an object storage service that stores data as objects. It’s designed to provide 99.999999999% durability and 99.99% availability of objects over a given year. In the past there have been many security incidents about S3 data exposure to public and since then…

S3

6 min read

How to secure S3 buckets
How to secure S3 buckets
S3

6 min read


Sep 6, 2022

Rethink before creating an IAM user

There are few scenarios in which we might need IAM credentials (static). i.e. in automations like terraform and if it runs on-premises. Creation of static IAM credentials should be avoided . So, what are the options if it’s part of your workflow/automations etc. :- 1. Explore IAM Roles anywhere document…

AWS

3 min read

AWS

3 min read


Sep 5, 2022

Key metrics for AWS monitoring

AWS observability and monitoring is de facto standard in all organizations. It’s worth considering the difference between observability and monitoring. Monitoring lets you know whether a system is working. Observability lets you understand why it isn’t working. There are few important metrics that we should have complete visibility to avoid…

AWS

4 min read

Key metrics for AWS monitoring
Key metrics for AWS monitoring
AWS

4 min read


Jun 24, 2022

What to do if you inadvertently expose an AWS Access Key or STS token ?

AWS IAM keys can be exposed by mistake, by automation and also intentionally. Another possibility is exposure of STS token i.e. short term/temporary credentials for an AWS account. Temporary credentials can be valid up to 12 hours. STS token access key always starts with “AKIA”. Organizations need to pro-actively remediate…

AWS

3 min read

AWS

3 min read


May 12, 2022

AWS China tips and ICP Recordal

Few tips regarding AWS China. It’s being managed by separate entity and currently operating in 2 regions i.e. Ningxia and Beijing regions. AWS offers fewer services in China in comparison to US region. IAM : No concept of root user login/email. To provision an AWS account you can use AWS…

AWS

2 min read

AWS

2 min read


Feb 15, 2022

11 reasons why Cloud Security Posture Management is important ?

Cloud Security Posture Management (CSPM) is a much needed tool for enterprises focussed on cloud security. I’ve list out below top 10 key aspects :- UEBA/Threat Detection with Machine Learning Cloud Resources Misconfiguration Multi Cloud Security (AWS/Azure/GCP etc.) Cloud Asset Management/Graph visualization Real Time Security Incident Alerts Compliance Framework and…

AWS

4 min read

AWS

4 min read

Sudhir kumar

Sudhir kumar

14 Followers

Working as Cloud lead/Architect with security mindset

Following
  • Mike Tyson of the Cloud

    Mike Tyson of the Cloud

  • Netflix Technology Blog

    Netflix Technology Blog

  • Welkson Renny de Medeiros

    Welkson Renny de Medeiros

  • Michael Reeves

    Michael Reeves

  • Kanivel

    Kanivel

See all (7)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech