
How to setup Multi Factor Authentication (MFA) devices in AWS?
Step-by-step guide to set up MFA in AWS: Choose ‘Assign MFA device’, select device type, name the device. To register another device go to Security Credentials and repeat
Step-by-step guide to set up MFA in AWS: Choose ‘Assign MFA device’, select device type, name the device. To register another device go to Security Credentials and repeat
In this blog we will create a CNAME for our cloud functions with path matchers. The problem with cloud function is that they use long
In this blog, we will create a CNAME for our cloudrun service function with path matchers. We will be using the load balancer method to
eBPF is an enhanced version of Linux’s BPF observability system that can improve monitoring and observability without modifying the kernel source code. Triggers attach eBPF programs to the Linux code path. Take a look!
Disclosure A new Critical Linux vulnerability was disclosed to the public on 7th March by Max Kellermann. It’s tracked as CVE-2022-0847 and has a severity
Introduction to Continuous audits for public cloud Businesses have lost track of crucial control measures needed for their cloud infrastructure due to the rapid adoption
Researchers Jamie Hill-Daniel and William Liu discovered & disclosed a vulnerability in Linux Kernel.
It’s assigned a CVE ID of CVE-2022-0185. And is rated as High Severity. This got introduced to Linux Kernel as part of version 5.1-rc1 in March 2019, almost 3 years ago.
Cloud audit is similar to any other audit, however, its main focus is on the nuances of cloud environments. The purpose of cloud computing audits is to determine whether cloud workloads are using best practices, complying with appropriate standards, and complying with certain benchmarks when offering services. The dynamic nature of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS) environments in the cloud increases the importance of auditing and compliance.
Amazon RDS manages your cloud and data backup, software patching, automatic failure detection, and recovery, which protects you and your organization from misconfigurations. Amazon Relational
IAM is a feature of AWS that is presented at no extra charge. However, having AWS IAM Misconfigurations is a constant headache for organizations. A single mistake can be worth millions. Implementing IAM can help you prevent catastrophic events like data breaches and insider attacks.