Posts

AWS Certificate Manager blog

Image
  AWS Certificate Manager Today we’re launching a new feature for  AWS Certificate Manager  (ACM), Private Certificate Authority (CA). This new service allows ACM to act as a private subordinate CA. Previously, if a customer wanted to use private certificates, they needed specialized infrastructure and security expertise that could be expensive to maintain and operate. ACM Private CA builds on ACM’s existing certificate capabilities to help you easily and securely manage the lifecycle of your private certificates with pay as you go pricing. This enables developers to provision certificates in just a few simple API calls while administrators have a central CA management console and fine-grained access control through granular IAM policies. ACM Private CA keys are stored securely in AWS managed hardware security modules (HSMs) that adhere to FIPS 140-2 Level 3 security standards. ACM Private CA automatically maintains certificate revocation lists (CRLs) in  Amazon Simple Storage Se

Why is a firewall important and What might happen if I don’t have a firewall?

Image
Why is a firewall important and What might happen if I don’t have a firewall? Why is a firewall important for my business? Not several businesses would operate without locks, alarms and CCTV cameras protective their premises from intrusion and theft. however protective your computer systems is equally important, to stop important business operations being disrupted, or even worse, your private data or belongings from being taken. Security measures square measure under the spotlight with the upcoming GDPR changes taking effect in might. you wish to be ready to prove that you’ve taken reasonable steps to shield your client information within the event of a breach. And a firewall is that the cornerstone of any network security strategy. Ok, however, what's a firewall? Think of a firewall as an electronic equivalent of the safety guard at your front gate. Firewalls examine the data that passes in and out of your business network to make sure that every one traffic is

AWS DynamoDB | AltF9

Image
AWS DynamoDB AWS DynamoDB is additionally fitted to storing JSON documents and use as a storage for key-value pairs. Having multiple types of indexes also as multiple types of query potentialities makes it convenient to be used for various types of storage and query needs. However, it's necessary to know that DynamoDB could be NoSQL info that is tough to be compared with a relational database, aspect by side. This conjointly makes it very tough for someone UN agency is coming back from a relational database background to design DynamoDB tables. thus it's necessary to know many underlying principles in using DynamoDB. the subsequent list contains twelve principals I follow once planning DynamoDB tables and queries. Use GUID’s or distinctive Attributes, rather than progressive IDs. Don’t try and normalize your tables. Having duplicate attributes in multiple tables is okay as long as you've got enforced ways that to synchronize the changes. Keeping pre-com

How does AD DS differ from Microsoft Azure Active Directory?

Image
How does AD DS differ from Microsoft Azure Active Directory? Active Directory was introduced as a hierarchic authentication and authorization database system to interchange the file Domain system in use on NT4 and previous servers. The NT4 domain model in 2000 was straining at the seams to stay up with evolving company structures, hampered by some quite severe limitations – most of twenty six,000 objects in a very file “bucket”, solely five varieties of fixed objects whose structure (properties etc.) couldn't be modified, most size of the information of 40Mb etc. NT4 Domains additionally primarily used NetBIOS (another file, Microsoft specific system) for its name resolution. For plenty of larger organizations, this necessitated multiple domain databases with terribly restricted and sophisticated interactions between those domains. Active Directory Directory Services (just referred to as Active Directory in those days) was free with Windows Server 2000 and was primarily ba

AWS serverless computing and its benefits

Image
 AWS serverless computing and its benefits  Develop applications without having to fret concerning the management of the underlying infrastructure - like servers and load balancers - independent of scale and usage. that's the promise of "serverless computing", the cloud trend of 2016 that follows the evolutions of the past decade: from physical hardware to virtualization, IaaS, and PaaS cloud services. With 'serverless', the main focus lies entirely with the development of functionalities and not with dependencies on the underlying infrastructure. Serverless computing is predicated on the FaaS-concept: function as a Service. You develop a microservice (such as scaling a picture or the process of user data) and upload this to a cloud service, like AWS Lambda or Azure Functions. Together, the various services kind a logical entity. Advantages A serverless architecture offers a variety of benefits. The architecture fits naturally inside endless deliver
Image
 AWS GuardDuty Threat Detection Service Amazon guard-duty could be a managed service that will threat detection showing the intelligence to safeguard the AWS accounts and workloads. It ceaselessly monitors for malicious or unwanted activities sort of a port scan, unauthorized penetration takes a look at etc. guard duty detects surprising behavior within the AWS atmosphere and generates notifications referred to as Findings that details the underlying security issue. AWS GuardDuty collects its inputs from 3 log streams. VPC Flow Logs, DNS logs, and CloudTrail events. Also, It will associate one AWS account with another account in order that you'll be able to read and manage their guard duty Findings on their behalf. About the Experiment I have added my laptop’s public informatics address to the AWS GuardDuty’s Threat list. Then I attempted to access AWS console associate degreed did an SSH to at least one of the EC2 instances of the AWS account, assumptive that guard duty wil

7 reasons to migrate your enterprise IT system to the cloud

Image
7 REASON TO MIGRATE YOUR BUSINESS TO CLOUD The world is dynamic at a speedy speed once it involves technology and innovation. each business desires to stay up the pace by performing, growing and maximizing the ROI from its investments. additionally, providing wonderful client expertise and meeting their desires is crucial for businesses to remain within the competition. to attain these objectives, businesses are viewing cloud computing. Cloud isn't a brand new thing currently. it's all over. whether or not you're checking your bank balance on your phone or shooting associate degree email to your colleague on your commute, you're looking forward to a cloud. According to Forbes, by 2018, a minimum of 1/2 IT outlay is going to be Cloud-based, reaching hour of all IT infrastructure, and 60–70% of all software system, Services, and Technology outlay by 2020. Why are several|numerous|such a big amount of|such a large amount of|such a lot of} businesses migrating