Security

Last Updated on 10 Dec. 2015, Total: 15 Articles and Tutorials

Learn how to best secure your AWS cloud environment from any outside threats.

  1. Security Token Service, Temporary Security Credentials for AWS

    There are several features of AWS that are little known or unexplored by the majority of rims using the AWS platform. In this article, as part of an introduction to AWSs platform series, we cover the Security Token Service (STS). We will look at use cases and features of this service and consider the benefits it may offer its users... Read More

  2. Secure services and resources with AWS Identity and Access Management (Part 5)

    Today in our final installment, Part 5, we’re going to address how to troubleshoot IAM problems... Read More

  3. Secure services and resources with AWS Identity and Access Management (Part 4)

    In this Part 4, we’ll wrap up the discussion with some tips on logging IAM events with AWS CloudTrail and how to troubleshoot IAM problems... Read More

  4. Secure services and resources with AWS Identity and Access Management (Part 3)

    In this, Part 3, we will continue the discussion of policies with some specifics about how you work with managed policies using the AWS Management Console and the AWS command line interface,... Read More

  5. Creating an ISMS that incorporates AWS (2015)

    In this article we explore what an information security management system (ISMS) is, and how it can be incorporated in AWS so that the risks are addressed... Read More

  6. Secure services and resources with AWS Identity and Access Management (Part 2)

    In this, Part 2, we’re going to delve more deeply into the subject of IAM policies, permissions, and roles, as well as how to integrate IAM into a federated environment... Read More

  7. Fundamental Areas of Consideration to Secure Workloads in AWS

    This article looks at areas you need to consider to secure worloads in AWS... Read More

  8. Secure services and resources with AWS Identity and Access Management (Part 1)

    In Part 1 of this article, we provide an overview of what AWS Identity and Access Management (IAM) is and how it works... Read More

  9. AWS, Security Based on a Shared Responsibility Model (Part 2)

    In part one of the article series we looked at Amazon Web Services share in the AWS Shared Responsibility Model. In this article we will try to better understand the customer responsibilities and consider best practices the customer should consider following to ensure his/her responsibilities are effectively met and security maintained... Read More

  10. AWS, Security Based on a Shared Responsibility Model (Part 1)

    In this article series we will consider the AWS Shared Responsibility Model to better understand the customer responsibilities and those of AWS when utilising their services and how the security benchmarks are achievable through a shared responsibility approach... Read More