Open in app

Sign in

Write

Sign in

CloudYali.io | Tech Blog
CloudYali.io | Tech Blog

21 Followers

Home

About

Published in

AWS in Plain English

·Pinned

10 Steps to Improve Your AWS IAM Hygiene and Keep Your Cloud Secure

As more and more businesses move their operations to the cloud, it’s becoming increasingly important to ensure the security of their cloud. One of the key ways to do this is by properly managing access to cloud resources through AWS Identity and Access Management (IAM) policies. However, many businesses are…

AWS

6 min read

AWS

6 min read


Published in

FAUN — Developer Community 🐾

·Pinned

Understanding Instance Metadata Service (IMDS)

“Would you leave your Strongbox open just because you locked the house door?” — “No, right?”. IMDS is like a strongbox containing precious information about your cloud. It is important that you understand IMDS, and how to secure it. It is time you take Instance metadata service (IMDS) seriously. What is EC2 Instance Metadata Service (IMDS)? The…

AWS

10 min read

Understanding Instance Metadata Service (IMDS)
Understanding Instance Metadata Service (IMDS)
AWS

10 min read


Published in

FAUN — Developer Community 🐾

·Pinned

The Absolute minimum every developer must know about AWS Security!

The cloud is becoming increasingly popular in our day and age. It is the driving force of the modern world, and engineers are starting to shift their careers accordingly. Whatever your profession, chances are that you will have to work with the cloud in some way or another. Terms such…

AWS

9 min read

The Absolute minimum every developer must know about AWS Security!
The Absolute minimum every developer must know about AWS Security!
AWS

9 min read


Published in

FAUN — Developer Community 🐾

·Pinned

AWS Config: Know before you take a plunge!

“Knowing is the half the battle won”, a wise soul once said. History is testimony to it. It worked brilliantly in favour of those, who knew exact state of troops, rations and weapons. Not just that, any weaknesses that adversaries may pick on. If you knew nothing about your army…

AWS

7 min read

AWS Config: Know before you take a plunge!
AWS Config: Know before you take a plunge!
AWS

7 min read


Jul 14

CIS AWS Foundations Benchmark v2.0 — Securing AWS Cloud resources

The cloud has become an integral part of modern-day tech infrastructure, and with that comes the need for tight security measures. The CIS AWS Benchmark is one of the most comprehensive security compliance standards for AWS cloud environments. It provides guidelines for configuring AWS services securely and is widely recognized…

Cloud Computing

3 min read

CIS AWS Foundations Benchmark v2.0 — Securing AWS Cloud resources
CIS AWS Foundations Benchmark v2.0 — Securing AWS Cloud resources
Cloud Computing

3 min read


Jun 24

AWS S3 Bucket Creation Date Discrepancy In Master And Other Regions

AWS S3 buckets are among the most commonly used AWS resource. At the same time, S3 buckets are most prone to misconfigurations. All major famous leaks generally have happened with S3 bucket misconfigurations. For this reason, the cloud teams continuously keep track of S3 bucket configurations. The AWS resource inventory…

Cloud Computing

3 min read

AWS S3 Bucket Creation Date Discrepancy In Master And Other Regions
AWS S3 Bucket Creation Date Discrepancy In Master And Other Regions
Cloud Computing

3 min read


Published in

FAUN — Developer Community 🐾

·Jun 19

Monitor IAM User Activities & Access to Regions and Services at scale

Are you tired of the hassle it takes to keep track of all your IAM users? Up until now, the only way to get a sense of your users was to hop from one account’s console to another, export lists, and then tediously combine them. Or, for the more technically…

Cloud

6 min read

Monitor IAM User Activities & Access to Regions and Services at scale
Monitor IAM User Activities & Access to Regions and Services at scale
Cloud

6 min read


Jun 10

How to find all regions an AWS Service is available

Writing management tools have always been fun and a challenge. Fun because it’s challenging. You always learn a thing or two. For example, we learned yet one more weird fact about AWS API inconsistency, maybe you already know- The S3 Bucket location API always returns null for all the buckets…

Cloud Computing

6 min read

Cloud Computing

6 min read


Published in

FAUN — Developer Community 🐾

·Jun 9

How to Monitor AWS IAM Root Users at Scale: Best Practices

In today’s cloud-centric world, managing identities and access plays a vital role in maintaining the security and efficiency of AWS environments. AWS Identity and Access Management (IAM) is the cornerstone for controlling access to AWS resources. However, as organizations scale and adopt multi-account environments, managing a large number of IAM…

10 min read

How to Monitor AWS IAM Root Users at Scale: Best Practices
How to Monitor AWS IAM Root Users at Scale: Best Practices

10 min read


Published in

FAUN — Developer Community 🐾

·Mar 6, 2022

Finding Unencrypted AWS EBS Volumes At Scale

Securing data is the biggest challenge when using Public Cloud such as AWS. The data in the public cloud is a frequent target for hackers. The user handles the security of its cloud assets under the shared responsibility model. Cloud asset security requires careful cloud resources configuration. The need for encryption For many applications…

AWS

5 min read

Finding Unencrypted AWS EBS Volumes At Scale
Finding Unencrypted AWS EBS Volumes At Scale
AWS

5 min read

CloudYali.io | Tech Blog

CloudYali.io | Tech Blog

21 Followers

Easily view and query all you AWS could — multiple accounts, multiple regions in a single place.

Following
  • Netflix Technology Blog

    Netflix Technology Blog

  • Tim Layton

    Tim Layton

  • Nina Pakshina

    Nina Pakshina

  • Stelios Moschos

    Stelios Moschos

  • CloudSploit

    CloudSploit

See all (19)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams