Here's What We Found

June 6, 2019 Cloud Hosting
Why the CIA Trusts AWS Security … and Why You Should Consider It, Too

...cloud security for your AWS implementation, and in this article, we discuss some of the key issues that a cloud security policy should address, and then describe the AWS security...

September 12, 2019 Cloud Hosting
All About AWS Advanced Security Services

...quickly remediate—or even preempt—them. This article describes AWS’s advanced security services and how it provides a level of security for data and apps when used strategically with the AWS security...

November 13, 2019 Cloud Hosting
AWS Building Blocks: Developer Tools

...CI/CD , Cloud Academy DevOps Engineering on AWS , Global Knowledge AWS Developer: Building on AWS , edX Build a Serverless Application with AWS CodeStar and AWS Cloud9 , AWS...

July 7, 2019 Cloud Hosting
Your Trusted Cloud Friend: The AWS Management Console

...the AWS Management Console, a free-of-charge web-based app for single-pane management of AWS accounts, services, and users. In some Regions, the AWS Console is also available as a mobile app....

January 30, 2020 Cloud Hosting
How AWS Helps with the Compliance Process

...for, and what their customers are responsible for. AWS Responsibilities AWS is responsible for the infrastructure security of the cloud. Their security policies, processes, and technology are designed to protect...

June 17, 2020 Web Development + Tech
AWS Application Deployment: Getting Started with AWS CodeDeploy & GitHub

...an AWS Account . Once your AWS account is created, follow these instructions to create an AWS Identity and Access Management (IAM) user for CodeDeploy. IAM helps you securely control...

May 22, 2019 Cloud Hosting
So you’re thinking about moving a legacy application to AWS …

...After moving that legacy application to the cloud, you’ll realize that many of the cloud benefits won’t be available without application refactoring. Using AWS Security Token Service (STS) to authenticate...