AWS has a slightly tedious(in my opinion) way of handling SSH connections to EC2. This is a quick guide to SSH into your AWS instances without the hassle of PEM files.
Recently, while preparing for my AWS MLS-CO1 exam, I discovered some features that impressed me. As someone with an extensive Azure background, I was pleasantly surprised to find that there may be more compelling reasons to make me lose my loyalty to Azure.
Developers are the driving force behind innovation in most technology companies today. However, rigid security practices often hamper their productivity by delaying access to critical systems and tool. How do we find a balance between security and productivity?
Recently, while preparing for my AWS MLS-CO1 exam, I discovered some features that impressed me. As someone with an extensive Azure background, I was pleasantly surprised to find that there may be more compelling reasons to make me lose my loyalty to Azure.
AWS Permission Boundaries are a critical component in safeguarding your AWS environment. When I first read about them, I thought they were redundant: “Why can't we just use granular policies to mitigate the risk of privilege escalation to begin with?”. But as I researched more on the topic I came to understand that it is all about autonomy and productivity for developers and security teams.
Demystifying AWS Cloud IAM using the roles and strategies of a championship-winning team like Manchester City - a novel approach to understanding complex cloud security concepts