You Shouldn’t Use the EC2 Launch WizardTL;DR: You should code your EC2 instances if you care about securityDec 31, 2021Dec 31, 2021
Clearing the AWS Certified Security — Specialty Exam (Updated 2022)Today, after a long while that I planned to do it, I crossed my fingers and approached the AWS Certified Security — Specialty exam, and…Dec 17, 2021Dec 17, 2021
Serverless Jupyter Hub with AWS Fargate and CDKJupyter notebooks are a useful piece of software. They have a variety of use-cases — from demonstrating some python code on a live manner…Jun 8, 20217Jun 8, 20217
Published inCyberArk EngineeringHow GitSecOps Can Help You Achieve Least PrivilegeAs a security architect, you should insist on having good and clear visibility of the security status of your product/service. While that…Aug 18, 2020Aug 18, 2020
Pro Tip: Allow Access to AWS Programmatic Accounts from Specific IP AddressesIAM policies are a great way to enforce authorization for Groups / Users / Roles to specific services, under specific conditions. In high…Sep 21, 2019Sep 21, 2019
Testing Ansible Roles on Windows Hosts Using Test-Kitchen and AWSWorking a-lot with Ansible lately, I was encountered in a real blocking problem. As we were working on deploying our software on Windows…Dec 6, 2018Dec 6, 2018
Dynamic DNS Using AWS Route 53Until not long ago, I was using DuckDNS services to get my home webserver up and running. As my ISP is demanding a respectful amount of…Oct 14, 20185Oct 14, 20185
Setup Your Private Domain Name System in AWSDuring my work, I encountered several times in a need of architecting & developing internal systems, which requires access from specific…Mar 27, 2018Mar 27, 2018
Deploy Elastic Beanstalk Application using Bitbucket PipelinesFor a long period of time, I was using custom git hooks on my own ec2 instance that ran Gogs open source software as a git server. I was…Jan 16, 20182Jan 16, 20182