Best Practices for Using AWS CloudTrail

by Hannah Grace Holladay / February 28th, 2022

Every user action can and should be tracked. On cloud platforms like AWS, user actions and service events interact with the platform’s management interfaces, whether with the web console or the API, which allows most things that happen in your cloud environment to be logged.  The transparency provided by comprehensive logging is one of the cloud’s most consequential security and compliance benefits. Using logs allows you to record all processing…

5 Ways AWS Security Features Strengthen Business Cloud Security and Compliance

by Hannah Grace Holladay / November 20th, 2021

Businesses have many infrastructure hosting solutions to choose from, from physical servers hosted in owned data centers, to colocated servers in managed data centers, to many different cloud platforms. However, in 2021, Amazon Web Services (AWS) is by far the largest infrastructure hosting platform in the world.  Businesses choose AWS because it offers a diverse array of cloud services backed by the technical expertise of one of the most valuable…

AWS IAM Account Security: 5 AWS IAM Best Practices

by Hannah Grace Holladay / November 15th, 2021

AWS provides dozens of cloud services ranging from storage and compute to machine learning and security services. AWS is by far the biggest cloud platform, and thousands of businesses entrust it with their most sensitive data and critical workloads. Ensuring only authorized users can access these assets is the job of AWS Identity and Access Management (AWS IAM).  As you might imagine, improper use of AWS IAM can create serious…

What to Consider When Choosing Managed Cloud Security Services

by Hannah Grace Holladay / October 22nd, 2021

Cloud platforms make it easier for businesses to leverage complex technologies. Instead of buying, configuring, and managing a physical server, you deploy an instance of a server in the cloud. Instead of licensing, installing, and updating enterprise software, you deploy software for the time and purpose that you need through your provider. Cloud platforms provide many technical intricacies through a user interface, but sometimes how and what you should configure…

AWS ECS vs AWS EKS: AWS Container Services Explained

by Hannah Grace Holladay / September 22nd, 2021

Containers are used to host code without the complexity and resource demands of virtual machines. They allow developers to combine code and dependencies into a standardized package that runs anywhere, making them the ideal foundation for cloud-native applications and microservices. But containers pose a problem. How do developers and DevOps professionals manage container creation, hosting, networking, and security? A business may deploy dozens of containers to host its apps and…