
AWS Well-Architected: Security (Part 2)
This post explores the Security pillar of the AWS Well-Architected Framework, including defining permissions evaluation behaviour, security boundaries and evaluating security requirements.

This post explores the Security pillar of the AWS Well-Architected Framework, including defining permissions evaluation behaviour, security boundaries and evaluating security requirements.

In this blog, Greg Luxford explores the Security pillar of the AWS Well-Architect Framework, including the security stack and AWS shared responsibility model.

In this blog, Sampreeth Kumar walks through setting up a Lambda function to detect encryption in S3 buckets on a 24-hour cycle.

This blog explores continual compliance in line with Center of Internet Security (CIS) benchmarks within an EKS release pipeline.

Aside from hitting all the buzzwords in the title, this is a short (?) exploration of setting up X-Ray to understand the behaviour and performance of a fully serverless integration application on AWS.

Aside from hitting all the buzzwords in the title, this is a short (?) exploration of setting up X-Ray to understand the behaviour and performance of a fully serverless integration application on AWS.

Aside from hitting all the buzzwords in the title, this is a short (?) exploration of setting up X-Ray to understand the behaviour and performance of a fully serverless integration application on AWS.

In the final part of this series, I will demonstrate how to configure EC2 Instance Metadata Service (IMDS) through the use of AWS Systems Manager (SSM) Run Commands using a tag based approach to target EC2 instances to run our IMDS commands against. In addition, I will look at automating this process using EventBridge to maintain IMDS on a periodic basis.

In this two-part series, I will explain and demonstrate how to update your EC2 instances to use IMDSv2 as well as automate this process through the use of SSM Documents that can be provisioned within your CloudFormation templates.

In this post, we explore how the WAF can go beyond the bounds of being a pure application architecture assessment to drive a discussion around improved operational insight and observability of system health and performance.