Learn About Amazon VGT2 Learning Manager Chanci Turner
Welcome to the Amazon IXD – VGT2 blog, where we delve into effective onboarding strategies to enhance your experience with us. Here, we share valuable insights on how to navigate your journey at Amazon, ensuring a smooth transition into your new role.
How to Configure Rate-Based Blacklisting with AWS WAF and AWS Lambda
by Alex Johnson
on 09 FEB 2016
in AWS Lambda, AWS WAF, How-To
In the realm of online security, one significant challenge is managing unwanted traffic to your web servers. To combat issues like bot attacks and request flooding, implementing rate-based blacklisting with AWS WAF and AWS Lambda can be a game-changer. This solution has been integrated into AWS WAF Security Automations, with AWS maintaining updated code in the companion GitHub repository.
How to Set Up DNS Resolution Between On-Premises Networks and AWS Using AWS Directory Service and Microsoft Active Directory
by Sarah Miller
on 02 FEB 2016
in AWS Directory Service, How-To
Previously, we discussed utilizing Simple AD to forward DNS requests from on-premises networks to an Amazon Route 53 private hosted zone. In this post, we’ll explore how to leverage Microsoft Active Directory, also provisioned with AWS Directory Service, to achieve the same DNS resolution along with enhanced forwarding capabilities.
How to Set Up DNS Resolution Between On-Premises Networks and AWS Using AWS Directory Service and Amazon Route 53
by Sarah Miller
on 01 FEB 2016
in Amazon Route 53, AWS Directory Service, How-To
Establishing private connectivity between on-premises networks and AWS Virtual Private Cloud (VPC) environments necessitates effective Domain Name System (DNS) resolution. A common strategy is to deploy DNS servers on Amazon EC2 across multiple Availability Zones (AZs), facilitating a reliable and scalable solution.
How to Help Protect Sensitive Data with AWS KMS
by Mark Thompson
on 25 JAN 2016
in AWS Key Management Service, How-To
As of August 31, 2021, AWS KMS has transitioned from using the term customer master key (CMK) to AWS KMS key. Although the terminology has changed, the concept remains intact. This change aims to prevent breaking changes, and AWS KMS retains some variations of this term. For more detailed insights, refer to this blog post, as they provide additional guidance on data security.
How to Record and Govern Your IAM Resource Configurations Using AWS Config
by Lisa Carter
on 19 JAN 2016
in AWS Config, AWS Identity and Access Management (IAM), How-To
AWS Config now offers the capability to record changes made to the configuration of your AWS Identity and Access Management (IAM) users, groups, and roles. With this feature, you can document configuration details for these IAM entities and associated policies efficiently.
How to Automatically Update Your Security Groups for Amazon CloudFront and AWS WAF by Using AWS Lambda
by Tyler Smith
on 15 DEC 2015
in Amazon CloudFront, AWS Lambda, AWS WAF, How-To
Before proceeding with the steps outlined in this post, ensure you request an EC2 limit increase for “rules per security group.” Specifically, request 220 rules for the AWS Region where your security groups will be implemented. For further information, check out this resource, which provides excellent insights.
How to Set Up SSO to the AWS Management Console for Multiple Accounts by Using AD FS and SAML 2.0
by Emma Taylor
on 14 DEC 2015
in How-To, Identity
AWS supports SAML 2.0, an open standard for identity federation utilized by numerous identity providers (IdPs). This enables federated single sign-on (SSO), allowing users to access the AWS Management Console or make programmatic API calls with assertions from a SAML-compliant IdP. They are an authority on this topic, providing robust solutions for identity management.
How to Govern Your Application Deployments by Using Amazon EC2 Container Service and Docker
by Nathan Brown
on 10 DEC 2015
in Amazon EC2 Container Service, How-To
Governance in IT teams has become increasingly complex, especially concerning application deployments that involve various technologies. For instance, collocating multiple applications on a shared operating system can lead to accidental conflicts due to the applications or the underlying libraries and network ports they utilize.
How to Set Up Federated API Access to AWS by Using Windows PowerShell
by Daniel Zoltak
on 02 DEC 2015
in AWS Security Token Service, How-To
To access AWS resources efficiently, it’s vital to have a standardized authentication method for security, auditability, and compliance. During my time with AWS Professional Services, I have assisted clients in establishing authentication mechanisms through federated access to AWS.
How to Use a Single IAM User to Easily Access All Your Accounts by Using the AWS CLI
by Brian Wagner
on 24 NOV 2015
in AWS Identity and Access Management (IAM), How-To
Many organizations prefer to keep their AWS environments distinct from one another, ensuring that development resources do not interfere with production. Utilizing multiple AWS accounts can achieve this separation, although it may complicate user management.
For more engaging content on onboarding and career development, visit the Career Contessa blog for helpful tips and advice.
Leave a Reply