
Instance interactive access
Generally, we create Linux instances allowing port 22 to access via SSH. Using AWS Systems Manager Session Manager instead of directly accessing via SSH we don't need inbound rules to open ports in Security Groups. There are no inbound rules. Normally we’d require tcp 22 to ssh into this instance. If we go back to Systems Manager, we can go to instance actions, start a session, and..what’s gonna happen? We are connected to our instance! We strongly recommend using AWS Systems

Using SSM Parameter Store
Some configurations can be considered private and high risk. Data such as Database Passwords and other valuable information can be safely stored in the SSM Parameter Store service. The service offers the possibility of storing the data that we consider to be “secret”, to later be consumed by our applications. Some of its features are: Serverless, scalable Version tracking of the configurations and secrets Encryption with KMS (optional) Notifications with CloudWatch Events Con

What Constitutes a HIPAA Violation?
Before cloud services can be used by healthcare organizations for storing or processing protected health information (PHI) or for creating web-based applications that collect, store, maintain, or transmit PHI, covered entities must ensure the services are secure. "For large organizations, the most common uses of the cloud are for hosting analytics applications and data (48%), hosting financial applications and data (42%), for operational applications and data (42%), and HR ap

The new normal and the cloud world
2020 has been a year full of uncertainty, many lives and businesses have been affected due to the COVID-19 pandemic. However, this situation has created many challenges for companies, families, and the world in general; for many of us it requires adopting new ways of working, and the word that would define this would be reinvention. We have had to reinvent ourselves in many ways or bring out those skills that we had not had to exploit, both as employees and as a company. In t

PCI Compliance in Cloud companies
Cloud security does not have to be a complicated topic. This service includes protection of critical information against theft, data leakage and deletion. It is important to have a provider that offers a wide variety of services that meets various requirements and that provides benefits, such as knowing where the data is stored, who can access it, continuous monitoring, among others, so the company can feel more secure and can focus more in business. In this article, we are g

Say no more to SSH keys, SSM is THE tool
The remote access login is the barrier that intruders must break in order to steal information. Several options have tried to help us in the prevention of intrusions. However, there is a reality: our physical device, while providing availability, is vulnerable to possible attacks due to its permanent connection to the net. Even the preservation and administration of private keys bring inconveniences related to physical devices or human errors. AWS brings the evolution, with S

Data breaches: Small business killer
Think for a moment that: 60 percent of small and midsize businesses (SMBs) affected by some sort of data leak go out of business within 6 months. 62 percent of CEOs of SMBs said that their firms don't have an up-to-date or active cyber-security strategy--or any strategy at all Cyber-attacks to SMBs increased 420% is the 2017-2018 period. Two-thirds of SMBs have suffered a cyber attack in the past 12 months The chances are even higher if your business has a strong online prese