-
IAM deep-dive
When I first created my AWS account, I created an IAM user account and attached an administrative-permissions policy to it. Thereafter, I signed into my account using that user and authentication, because the root user has super-powerful system powers which is dangerous and (most of the time) unnecessary. In a different exercise, IAM policies have…
-
Data Protection w/ Encryption (KMS)
One of the critical components of ensuring that data remains confidential, and other critical aspects such as nonrepudiation and authentication, is through the use of encryption methodologies. In this post, I’m going to walk through configuring AWS Encryption using the CLI, creating an encryption key using KMS (which will be used to encrypt and decrypt…
-
Patches! Using the Patch Manager ( w/ AWS Systems Manager)
One of tthe challenges of mitigating vulnerabilities and building a robust defense against potential threats against networked systems includes making sure that OS and app software is up to date and patched against known vulnerabilities and security risks. Especially if there are a lot of instances involved! It’s so easy to spin up new EC2…
-
Network Hardening Using Amazon Inspector and AWS Systems Manager
During my graduate studies in Information Systems, I was introduced to cybersecurity and became really interested in it. Since then, I’ve been focusing on learning cloud services and IaC, but I’m interested in pulling the security aspect in as well. To that effect, I’m going to be using Amazon Inspector and AWS Systems Manager to…
-
Deploying Container with Fargate
Building on my previous post where I created a docker container and pushed it to Docker Hub, I’m going to be using the AWS ECS service to deploy said container, and I’ll be using the Fargate service. In ECS, I create a cluster named ‘inspiring_pictures_container’, and am a little perplexed because I don’t see the…