security

Security-Best-Practices-For-Serverless-Applications

Security Best Practices For Serverless Applications

Table Of Contents Use the principle of Least Privilege where possible. Use secure storage for storing secrets. Ensure Secure Communication of Transit Data. Ensure Proper Authentication and Authorization using API Gateway. Log and Monitor Functions. Establish Secure Coding Practices. Secure Software Delivery Lifecycle. Integrate WAF but don’t rely completely on it. Correctly Define IAM Roles …

Security Best Practices For Serverless Applications Read More »

Using-AWS-Lambda-For-Governance-And-Compliance-Automation

Using AWS Lambda For Governance And Compliance Automation

Table Of Contents Setting up AWS Config. Setting-up AWS Config via the CLI. Adding Compliance Rules to AWS Config. Viewing Configuration Compliance. Via the Web console. Via the CLI. Custom Config Rules with AWS Lambda. Associating the Lambda with a Custom Rule in AWS Config. Cleanup. Conclusion. Additional resources. If the phrase “governance and compliance” …

Using AWS Lambda For Governance And Compliance Automation Read More »

How-to-securely-manage-credentials-to-multiple-AWS-accounts

How to use aws-vault to securely access multiple AWS accounts

As soon as you start working with more than one project or organization in AWS cloud, the first question you may have is how to manage awscli credentials and have to use them easily and securely to get access to all your AWS accounts and environments. In this article, we’ll cover aws-vault – a tool to securely …

How to use aws-vault to securely access multiple AWS accounts Read More »