Sometime ago, i was working in a complex Greenfield project. We had to design a secure infrastructure, make sure that all traffic was encrypted at Rest and in Transit and…
Data stored in Amazon S3 will now be encrypted by default, a change that brings AWS in line with competitor policies. As of January 5, 2023, S3 automatically applies server-side…
A typical AWS infrastructure can consist of numerous resources that might need to be managed across different accounts and regions. Setup is often a manual process that can be overwhelming…
A large number of businesses and organisations have workloads on-premises and in the cloud. In this Hybrid approach there are times that users in your corporate office need to be…
In this post, i am going to show you, how to design a 3-Tier architecture, to host your application by following Best Practices. This option offers better security, HA (High…
Prowler is a tool that can be used to scan an AWS account for security best practices and potential security issues. Here are the general steps for using Prowler to…
Migrating from Squid Web Proxy to AWS Network Firewall can be a straightforward process, but it will depend on the complexity of your existing setup and your specific requirements. Here…
AWS Control Tower is a fully managed service that makes it easy to set up and govern a multi-account AWS environment. It automates the process of setting up a secure,…