Category

Security Groups

Amazon Cloud Inches Closer to the Enterprise with VPC

amazon-vpc-01Amazon’s AWS  VPC (Virtual Private Cloud) is like a canvas. It lets you define private networks, the way they interact with each other, routing, and security. Now, it even lets you terminate VPN connections from your main corporate network out-of-the-box and, best of all, it doesn’t cost you anything to use it.

The Practitioners Guide to Cloud Security

Practiotioners Guide to Cloud SecurityThere are countless benefits to cloud computing including increased efficiency, streamlined processes and reduced costs. It also, however, threatens the security of your online services. Admins may leave ports open to connect to their servers while also giving access to hackers. Additionally, server sprawl deems security unmanageable. Worst of all, security solutions on the market today don’t have appropriate business models and/or technology that can migrate and scale.

The 5 Biggest Mistakes Made With Cloud Firewalls

The greatest incentive to move to the cloud is to reduce cost. Organizations invest a lot to that end, but that investment is for not if your cloud isn’t protected. Most often, these mistakes are attributable to either a misinterpreted security policy or cluttered, nearly illegible security rules.

How to Launch an EBS Optimized EC2 Instance with a Provisioned IOPS Volume

AWS EC2 is a scalable, reliable and low-priced offering from Amazon for the user’s virtual computation or hosting needs. Current web and mobile applications require very high I/O for storing or retrieving plenty of data in order to deliver a rich and personalized experience. Considering this, AWS announced the IOPS Volumes and EBS Optimized Instance in August, 2021.

The present guide demonstrates how to launch an EBS-Optimized EC2 Linux Instance using the provisioned IOPS volume.

How to Set Access Control (IAM) for a Glacier Vault

An AWS account has full permission to perform all actions on the Amazon Glacier Vault that are part of the account. However, the AWS Identity and Access Management (IAM) users don’t have any permission by default. You can control access by setting vault-level access policies using the AWS IAM service.

With AWS IAM you can create a policy for a specific user or group. This guide shows you how to set an access level policy for a vault.

Ultra Secure Data Center on Amazon Cloud

The following presentation was created by Lahav Savir - Architect and CEO at Emind Systems Ltd. Emind Systems is an AWS solutions & consulting vendor, serving ~100 AWS customers.

Emind Systems Best Practice for Ultra Secure Deployment on Amazon Cloud

In this article I will introduce our in-house best practice for an ultra-secure application deployment on the AWS cloud. This best practice is based on Emind System’s experience in performing dozens of infrastructure projects based on the Amazon Web Services’ platform.

Encrypt Your Data in the Cloud

Keeping data private and secure has always been a business imperative for data privacy and regulatory compliance reasons, and as businesses seriously consider migrating to the cloud, data security is one of the most significant concerns. Once data is moved to the cloud, it becomes vulnerable to a number of new threats, and data security must be addressed jointly by the cloud provider and the customer itself. In our presentation we will discuss the shared responsibility module, review the pros and cons of current approaches to cloud data security, and discuss new and emerging technologies such as split-key encryption and partially homomorphic key encryption that enables organizations to maintain data privacy in a public cloud environment.

This presentation brought to you by Ariel Dan, Co-Founder VP sales & Marketing at Porticor cloud security.

[No time to attend to your AWS security breaches? Newvem automatically recognizes your database servers,analyzes their vulnerability, and provides you with drill downs covering insights on specific instances for a quick fix turnaround. Learn more]

Keywords: Amazon AWS Cloud services, security group, AMI, Amazon Machine Image, Cloud IP ports, database Ports, AWS Security vulnerabilities, AWS Firewall, Shared Resources, Data Encryption, S3, EBS

How to Manage Separate Multiple Security Groups

We covered how to create and manage AWS security groups. In this how to guide we will extend concept with creating more than a single security group and assigning multiple to a specific EC2 instance.

Scale cloud application deployment over AWS can have different app servers, DB servers, email server, etc. It is advisable to create a separate security group for each functionality or for each port and assign to the respective cloud resources i.e. instances.

In this guide we will create multiple security groups, each will hold the following different functionality: Database, Web App, HTTP, Email. The steps follow important cloud security and firewall best practices.

In Depth: AWS IAM and VPC

One of the most important leading features that Amazon Web Services released on 2011 was the VPC. Together with the IAM (Identity Access Management)  It helps the enterprise to deploy a more secure and  robust environment inside the amazing AWS public cloud. Before the VPC, all the AWS computing nodes were exposed to the internet without the option to protect specific instances that include critical service and data. The security groups were a good tool to support security separation of instances though it was never enough and include a great amount of custom work. With VPC the public cloud consumer can create a private secured portion that easily communicate with the public resources. These slides present best practice on how to manage IAM and an example of VPC deployment with a secure integration with the  the on-premise resources.

Hitchhiker's Guide to The Cloud

Newvem's eBook for Cloud Operations