Reviewing AWS accounts with a focus on security is part of my day-to-day job. My most common finding: unwanted public read or write access to S3 buckets. Why is that? Because there are three different ways to define who can access your S3 buckets: IAM p...
API Gateway provides a feature to limit the number of requests a client can make per second (rate) and per day/week/month (quota). Rate limiting is very useful to protect your system from resource starvation caused by a client flooding your system with ...
AWS introduced the t3 instance type in August. Time to update the EC2 Network Performance Cheat Sheet. The following table shows the network capabilities of t3 instances. Compared to the last generation t2 there is no difference in the baseline through...
We wrote and published the first edition of Amazon Web Services in Action in 2015. Our book quickly became a bestseller. We are still amazed by the positive feedback we receive from our readers every day. Thanks for that! Nevertheless, AWS is changing f...
Last weekend, I had the chance to play around with Alibaba Cloud at the DevOps Meetup in my city. An Alibaba Cloud Solution Architect introduced the platform and was well trained on AWS as well, so he could compare both platforms for us. I also spent so...
Lately, I’ve been having much fun with Amazon Cloud Directory. Three months before, Cloud Directory was all new to me. Today, I am convinced that Cloud Directory is a neglected Serverless data store that deserves much more attention. Let me explain what...
Paul Duvall (CTO at stelligent) interviewed Andreas and me for the DevOps on AWS Radio. We talked about: Our book Amazon Web Services in Action and what changed in the second edition Our top 3 recommendations for enterprises on what to do to be most s...
We are maintaining multiple Open Source projects where we focus on CloudFormation templates. To ensure that the templates are of high quality, we leverage automated testing and pull requests. We could use the CodeBuild GitHub integration to execute yaml...
S3 comes with a bunch of features to encrypt your data at rest. Data at rest means inactive data stored physically on disk. Before we dive into encrypting data at rest, I want to highlight that there is also data in use and data in transit. If the data...
The principle of least privilege is key when it comes to securing your infrastructure on AWS. For example, an engineer should only be able to control EC2 instances that are in scope for her day-to-day work. But how do you make sure an engineer is only a...