Introduction If you work with Windows in AWS, you must already have a preferred way of connecting to your instances. Whether you … Read The Full News

Offload Secret Management to AWS Secrets Manager from Amazon EKS
Introduction Secrets in Kubernetes, are Base 64 encoded. As such, its trivial for anyone with access to the secret objects, to decode … Read The Full News

Enforce EBS Encryption Across an AWS Organization
Introduction My team & I manage an AWS organization with 90+ AWS accounts. We recently embarked on a campaign to enforce EBS … Read The Full News

How to Recover lost Windows EC2 instance Key Pair
Introduction In this article, we will discuss how to connect to EC2 instances if the key pair is lost. The following steps … Read The Full News

Evaluating CNAPP Solutions for AWS
Introduction CNAPP stands for Cloud-Native Application Protection Platform. CNAPP is a new category of software security products, that encompass the functionalities of … Read The Full News

Sharing Secrets in Secrets Manager with Other AWS Accounts
Say you have a secret stored in AWS Secrets Manager in Account A & you need to make this secret available for … Read The Full News

A Simple 3 Step Guide to Cross-Account Access in AWS
Consider a scenario: you have 2 AWS accounts: dev & prod. You need an IAM user in dev to be able to … Read The Full News

Understanding Amazon S3 Encryption Mechanisms
S3 provides several encryption mechanisms to protect your data at rest. These can be broadly categorized into server-side encryption & client-side encryption. … Read The Full News

AWS IAM Roles: Types & Use Cases
An IAM user in AWS represents a real-world entity that needs access to AWS resources, like a person or an application. The … Read The Full News