In last week’s post, we gave a high level overview of vulnerability assessments. This type of assessment results in a prioritized list of vulnerabilities in your deployment. It’s an excellent first step in knowing the state of your deployment. The next step you should take is to conduct a penetration test. The Test A penetration…Read More
Vice President, Cloud Research
- Mark Nunnikhoven helps organizations build securely in the cloud. Opinionated, passionate, driven, Mark is more than a cliched byline. In his 20+ years tackling development and operational challenges around the world, Mark has seen all manner of "interesting" solutions. An engaging public speaker, an O'Reilly video author, Mark is an accomplished computer scientist and security executive. Mark is available online at http://markn.ca and @marknca.
Last week, we tackled the basics of monitoring your AWS deployment. This week we’re going to shift gears and take a look at encryption. Data Drives Your Business Your business runs on data and information. One of the biggest concerns about moving to the public cloud is the safety of that data. With a little due…Read More
So far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surface—the area exposed to the outside world—of your application. Now it’s time to add the next layer of controls to you application, starting with a host-based…Read More
Last week, Justin covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best Practices [PDF] and AWS Risk and…Read More
In last week’s post, Protecting your resources with AWS Identity and Access Management, Justin covered the basics of AWS Identity Access Management (IAM). This week, we’re going to take a look at password policies and multi-factor authentication using IAM. Password Policies The value of a strong passwords is well known. Most organizations already have a password…Read More