Category

Security Policy

How to Launch EC2 Auto Scaling with an IAM on AWS Cloud

AutoscalingAWS Auto Scaling allows the user to automatically scale the Amazon EC2 compute resources up or down as per the defined conditions. The AWS resources launched with Auto Scaling require the AWS security credentials to access other AWS resources. AWS provides the IAM Role to easily access the other AWS resources from the newly launched EC2 computer resources.

(For example, a newly launched EC2 instance may need the AWS credentials to take a regular backup of the EBS volume).

To assign the IAM Role to Auto Scaling, the user has to create an IAM instance profile with EC2 access. An instance profile is a container for the IAM Role. The user has to first create an IAM role, which has the permission to access the EC2 resources. The above mentioned role must be added to the instance profile.

The present guide demonstrates how to launch Auto Scaling with an IAM role. Since AWS does not provide the management console for Auto Scaling, all the tasks would be performed by CLI.

Secure Your Cloud Building Blocks: Overview and a Few Tips

AWS Cloud Security TipsThe cloud enables great agility and can reduce costs if used right. But does it also manage risk? In fact, the cloud contains the same traditional hosting risks as well as specific related risks to your production environment running on the cloud. With IaaS dynamic environment you pay only for what you use enabling alignment with actual real-time demand. The cloud instance is a temporary resource that is created from a gold master image automatically and on demand. This basic cloud automation capability makes traditional patching redundant and fast provisioning extremely easy. It is an important consideration that changes some basic security deployment perceptions when moving from traditional infrastructure to the cloud.

Amazon Cloud Inches Closer to the Enterprise with VPC

amazon-vpc-01Amazon’s AWS �?VPC�?(Virtual Private Cloud) is like a canvas. It lets you define private networks, the way they interact with each other, routing, and security. Now, it even lets you terminate VPN connections from your main corporate network out-of-the-box and, best of all, it doesn’t cost you anything to use it.

The Practitioners Guide to Cloud Security

Practiotioners Guide to Cloud SecurityThere are countless benefits to cloud computing including increased efficiency, streamlined processes and reduced costs. It also, however, threatens the security of your online services. Admins may leave ports open to connect to their servers while also giving access to hackers. Additionally, server sprawl deems security unmanageable. Worst of all, security solutions on the market today don’t have appropriate business models and/or technology that can migrate and scale.

The 5 Biggest Mistakes Made With Cloud Firewalls

The greatest incentive to move to the cloud is to reduce cost. Organizations invest a lot to that end, but that investment is for not if your cloud�?isn’t�?protected. Most often, these mistakes are attributable to either a misinterpreted security policy or cluttered, nearly illegible security rules.

Case Study: Time To Know Optimizes its AWS Cloud Costs with Newvem

Time To Know provides a breakthrough solution for today’s one-to-one computing classrooms.

The company utilizes a hybrid cloud infrastructure that combines AWS with a ‘co-location’ data center near its corporate offices. Time To Know initially adopted AWS with the aim of cutting costs. Having adopted the cloud after its processes were already in place, however, has left much room for improvement.

The ease of acquiring AWS instances sprawled the company’s footprint by 40%. It was clear they were spending too much money but not how that could be remedied.

Getting Started with EC2 Cloud Resources Backup

The cloud definitely marks a new era. Not only can we manage our resources in a flexible way and with no capital investment, but we can also enjoy the state-of-the-art infrastructure of large cloud providers, like AWS cloud. Specifically, when we use EC2 to compute endless resources, we know that in terms of the durability of our virtual servers, power supply, and storage, we can trust AWS to have the best of the best.

How to Set Access Control (IAM) for a Glacier Vault

An AWS account has full permission to perform all actions on the Amazon Glacier Vault that are part of the account. However, the�?AWS Identity and Access Management (IAM) users don’t have any permission by default. You can control access by setting vault-level access policies using the AWS IAM service.

With AWS IAM you can create a policy for a specific user or group. This guide shows you how to set an access level policy for a vault.

Emind Systems Best Practice for Ultra Secure Deployment on Amazon Cloud

In this article I will introduce our in-house best practice for an ultra-secure application deployment on the AWS cloud. This best practice is based on Emind System’s experience in performing dozens of infrastructure projects based on the Amazon Web Services’ platform.

Cloud Compliance: Part 2 – Top 10 Tips

Cloud ComplianceIn the first part of the Cloud Compliance series, I talked about the basics; what compliance is. Short recap: Compliance is when you have certain laws, procedures and regulations to follow and how they comply with companies’ (customers’), countries’ and branch laws, procedures and regulations – do they fit together?

In this part I present a �?more practical approach. Thanks to the great help from the cloud-based,�?SaaS�?pioneer -�?LivePerson, you can find in this article top 10 tips that can help you start right.

Hitchhiker's Guide to The Cloud

Newvem's eBook for Cloud Operations