The Fundamental Security Concepts in AWS – Part 3 of 3
Note: A modified version of this article was first published in DZone. Welcome back! If you missed Part 2, check it out here. Securing Data at Rest Data at rest includes inactive …
Note: A modified version of this article was first published in DZone. Welcome back! If you missed Part 2, check it out here. Securing Data at Rest Data at rest includes inactive …
Introduction NOTE: A modified version of this article was first published on DZone. Two weeks ago, I presented the first of a three-part examination of security concepts and controls in AWS. We …
The Shared Responsibility Model Note: A modified version of this article was first published on DZone. When you begin working in AWS, the most important security (and, to a …
Goal: Have an automated, auditable secure CI/CD environment where security controls are transparent to developers and users. To this end, I propose the following: Ensure development, QA, and production servers …
How many times have you been working with multiple containers & there is that one *simple* problem that takes you two days to figure out? You can go get kubernetes …
Obviously not. Why is this so obvious? We’ll get back to this in a moment, but first I want to describe how a LinkedIn Invitation to Connect led to this …
CLIQSAFE: STAGE 1 Interrogates user email for all URLs Packages them up in a small JSON call to CliqSafe Cloud through port 80 (or other port). May or …