Category

Cloud Compliance and Security

How to Separate Key-Pair Authentication for Individual User

Cloud Security Management - Overview and Challenges

What’s your first priority cloud security concern ?

From an attacker’s perspective, cloud providers aggregate access to many victims’ data into a single point of entry. As the cloud environments become more and more popular, they will increasingly become the focus of attacks. Some organizations think that liability can be outsourced, but no, it cannot! This presentation will answer questions such as what are the key security challenges for new cloud comers. What are the options and how you can start with a safe cloud deployment?

  • The different Cloud security aspects
  • The cloud vendor versus the cloud customer - the responsibility perception
  • How Newvem helps its customers to avoid AWS cloud security vulnerabilities leveraging eco-system of cloud vendors.

Keywords: Amazon AWS Cloud services, Security group, Shared AMI, Amazon Machine Image, Cloud IP ports, Database Ports, AWS Security vulnerabilities, AWS Firewall, Compliance, AWS Complexity, Dome9 cloud security, EC2, Security Policy, Cloud Security Management

How-to Create a New EC2 Instance Key Pair

A lot of people use Amazon’s cloud service for a myriad of things, and not everyone has the best implementation practices. This opens your cloud to any number of security issues and vulnerabilities that could otherwise be avoided.

How to Manage IAM Security Policies

In Depth: AWS Shared Security Model

AWS Shared Security Model - Slideshare presentation brought to you by the AWS cloud guys. The presentation gives a nice basic overview on AWS Security including the “Shared responsibility model”, features and products. If you are new on AWS this is a must in order to quickly understand what are the public cloud vendor’s expectation and will support your plans to move and utilizing the public cloud while outsourcing part of your IT security.

The 5 Biggest Security Mistakes Users Make in Amazon’s Cloud

The following article was posted on GigaOm and was based on our analysis and cloud security insights that Newvem’s big data engine reveals. In this article, you will find 5 important low hanging fruits that you should recognize in order to have your Amazon cloud account secure. If you are an Amazon cloud services’ user, we invite you to connect your AWS cloud account to our non-intrusive service in order to know your cloud and learn more, not only your AWS security, but also about money that you’re wasting, point of failures (POFs) and poor performance yields.

Amazon AWS IAM – Several Tips and Practices

The cloud presents many security management challenges. Ensuring compliance, identity management, and other security best practices can be a challenging task. AWS Identity and Access Management (IAM) is one of the tools that can be used to mitigate the risks associated with these challenges. In this article, I will discuss a few of the high points of IAM, including the different options and limitations that this AWS service brings together with its fascinating capabilities.

Many cloud computing users strive to apply security best practices to their cloud computing strategies. One of the best components that Amazon offers to manage security in their cloud computing service is their IAM mechanism, which allows an account owner to create users and manage their permissions within an AWS account.

NIST Guidelines on Security and Privacy in Public Cloud

Although more and more cloud newcomers are grasping the essence of the cloud, the challenges are still great. EU or US “cloud regulations” with regard to security and privacy is still a popular topic of discussion in the cloud social sphere. NIST, a US government research organization, with its cloud program is one of leaders in pushing to define the cloud with its “right rules” supported by relevant standards.

“Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and services from inside to outside the organization. While aspects of these characteristics have been realized to a certain extent, cloud computing remains a work in progress. This publication provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment” 

The 10 Most Common Amazon’s AWS Usage Mistakes

10 common amazon AWS usage mistakesAWS (Amazon Web Services) provides an excellent cloud infrastructure solution for both early stage startups and enterprises.  The good news is that AWS is a pay-per-use service, provides universal access to state-of-the-art computing resources, and scales with the growing needs of a business.  The bad news – AWS can be very hard for early stage companies to onboard, while enterprises usually spend too much time with ‘busy work’ to optimize AWS and keep costs under control.

AWS EC2 Security Groups Usage – How secure is your data in the cloud?

Hitchhiker's Guide to The Cloud

Newvem's eBook for Cloud Operations