Category: How To?

Building Secure S3 Buckets

How to Build A Secure S3 Bucket?

A few days ago, I searched for data breaches and leaks due to insecure S3 buckets on Google. Needless to say, I was blown away by the number of high-profile names on that list. Companies like FedEx, Verizon, Accenture, and even government organizations like the Pentagon. So in this article, ...

Reading Continue
How Can Your Application Accomplish ISO 27001 in AWS Cloud

How Can Your Application Accomplish ISO 27001 in AWS Cloud?

In this article, we will take a look at how your application can accomplish ISO 27001 in AWS Cloud. International Organization for Standardisation, also known as ISO/IEC 27001:2013, is an international body that governs the specific set of laws and regulations to secure the information. It partners with the International ...

Reading Continue
How To Reduce Your AWS Cloud Cost

How To Reduce Your AWS Cloud Cost?

When the bills from your cloud service provider kick in, we regret the services we subscribed to and used only once in a while. Even a cheaper looking service adds up to the pile of bill money we ought to pay at the end of the day or month. This ...

Reading Continue
Tags in Public Cloud to organize workload

A Detailed Guide On Tagging For Better Cloud Cost and Resource Management

For effective management of computational costs and utilization of resources in public cloud environments, developers must learn how to use the tags effectively. They should also develop an effective system and tag management strategy across enterprises of any size. Developers must also discover how cloud management tools can help to ...

Reading Continue
How to evaluate SaaS Provider?

List of Security and Operational Questions to Ask A SaaS Provider Before Signing Up

After you have decided that to adopt cloud computing for your business, the next step is to look for a cloud services provider, and like many companies, you will be looking for a SaaS Provider. These days you hear a lot about SaaS applications. SaaS stands for Software as a ...

Reading Continue
Cloudanix DevOps

A Complete Guide On How An Individual Can Practice Continuous DevOps

Introduction DevOps is the combination of cultural philosophies, practices, and tools that increase an enterprise’s ability to deliver applications and services at a very high speed. It also evolves and improves products faster than enterprises using traditional software for development and infrastructure management processes. The work of a DevOps engineer ...

Reading Continue
Breach

A Practical Step by Step Guide To Prevent Security Breach Of Your AWS Account

Amazon Rainforests, the world's largest rainforest, is crisscrossed with several rivers, inhabits over a thousand types of flora and fauna. It is so densely populated with greenery that only the person knowing the exact right path can find it once something goes inside. In other words, it is secure. Probably ...

Reading Continue
AWS Billing - How it Works?

How To Master Understanding Of Your AWS Bills and Tools You Can Use?

AWS provides you with an unlimited amount of cloud and various services. Still, it does not change the fact that it can have spikes in your all over cost if your AWS resources are not kept in check. A lot of focus is paid to understand the various services like ...

Reading Continue
Cloudanix - How to respond to data or security breach?

How to respond to a Data or Security Breach?

A data or a security breach is a security incident in which information is accessed without authorization, thereby violating its confidentiality. A data or security breach can be done by anyone including an employee, a rival organization, or just a malicious agent. The motive can be any fraudulent activity like ...

Reading Continue

AWS Events and Changes You Should Track For Your AWS Account Security and Operational Excellence

AWS CloudTrail service captures and publishes every action taken or change performed across any other AWS services. These changes could come as a result of Console use by a user An application running it’s code A SaaS partner using assume role running/ accessing some API in your account An event ...

Reading Continue