So far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surface—the area exposed to the outside world—of your application. Now it’s time to add the next layer of controls to you application, starting with a host-based…Read More
Vice President, Cloud Research
- Mark Nunnikhoven helps organizations build securely in the cloud. Opinionated, passionate, driven, Mark is more than a cliched byline. In his 20+ years tackling development and operational challenges around the world, Mark has seen all manner of "interesting" solutions. An engaging public speaker, an O'Reilly video author, Mark is an accomplished computer scientist and security executive. Mark is available online at http://markn.ca and @marknca.
Last week, Justin covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best Practices [PDF] and AWS Risk and…Read More
In last week’s post, Protecting your resources with AWS Identity and Access Management, Justin covered the basics of AWS Identity Access Management (IAM). This week, we’re going to take a look at password policies and multi-factor authentication using IAM. Password Policies The value of a strong passwords is well known. Most organizations already have a password…Read More