Security

Using IAM Roles Anywhere to Eliminate Static AWS Credentials

Using IAM Roles Anywhere to Eliminate Static AWS Credentials

In this blog, I’ll guide you through the process of setting up AWS IAM Roles Anywhere to securely provide temporary AWS credentials for your external workloads, eliminating the need for static credentials and enhancing your security posture.

Read More
Monitor Critical IAM Actions in AWS Using CloudTrail and SNS

Monitor Critical IAM Actions in AWS Using CloudTrail and SNS

This blog post explains how to monitor AWS IAM activity with CloudTrail, EventBridge, and SNS to track critical API calls in real time, enhancing security and compliance.

Read More
Setup an AWS KMS custom key store using AWS CloudHSM

Setup an AWS KMS custom key store using AWS CloudHSM

In this blog, I’ll walk you through how you can leverage a CloudHSM custom key store to gain full control over your cryptographic keys and operations, ensuring compliance with stringent security standards while maintaining the flexibility of AWS cloud services.

Read More
Building a Cloud SIEM with AWS OpenSearch Security Analytics

Building a Cloud SIEM with AWS OpenSearch Security Analytics

In this blog post, I'll show you how to build a lightweight SIEM system in AWS using AWS OpenSearch and its Security Analytics features, combined with Zeek. This solution enables real-time monitoring of cloud network traffic and generates alerts when potential threats are detected.

Read More
Build a scalable IDS and IPS solution using Suricata and AWS Gateway Load Balancer

Build a scalable IDS and IPS solution using Suricata and AWS Gateway Load Balancer

In this blog post, I will demonstrate how to leverage Suricata with the AWS Gateway Load Balancer and Terraform to implement a highly available, scalable, and cost-effective IDS/IPS solution in AWS. This approach will enable you to monitor network traffic, detect threats, and block them before they reach your systems.

Read More