Home Tags AWS cloud security

Tag: AWS cloud security

IAM role with admin permissions for AWS Lambda functions

Cloud security can be configured according to the exact business requirements of the organization. It is the need of the hour to make sure...

AWS Lambda function tracing using AWS X-Ray

If you are using AWS Lambda as your serverless architecture for the development, you should be concerned about the security aspect of it. It...

Amazon Redshift Clusters with less than 1 backup retention day

Amazon Web Services offers Redshift to cater to the need of a fully managed data warehouse service. It performs data queries on different computer...

Server Access Logging for your Amazon S3 bucket

AWS S3 helps you to store data in scalable containers called buckets. You can store data of all sizes; from text files to large...

S3 Bucket Policy with CloudWatch Alarm – Securing storage before it...

Amazon S3 is a widely appreciated cloud storage service. Not only it stores your data but also able to tackle the stored data in...

Enable AWS Route53 domain transfer lock to secure your cloud

AWS Route53 plays an important role in determining the security of your cloud infrastructure. This service is responsible for routing internet traffic to your...

Amazon EC2 instances should have termination protection enabled

There are multiple aspects and factors that can impact the security posture of your Amazon EC2 instances. In order to ensure that they are...

AWS RDS instances with mis-configured security groups attached

It is advised that security groups should be associated and configured appropriately with your AWS RDS instances which will make your cloud environment more...

Virtual Private Network (VPN) – How to track configuration changes

AWS Virtual Private Cloud (VPC) is a commercial cloud-based service for enterprise customers who prefer to run their workloads in the private cloud. It...

AWS RDS database should not have default master username

AWS RDS instances are used to store large volumes of confidential data and organizations cannot afford to risk this data at any cost. Therefore,...