You can have your cake and eat it, too: MicroVMs feature the strong isolation of virtual machines and lightweight behaviors of containers.
Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.
SaltStack is a fast and reliable modular toolbox written in Python that contains ready-made modules for many configuration management purposes.
Pulumi promises a unified interface and surface for orchestrating various clouds and Kubernetes.
A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.
Monitoring with AWS Lambda serverless technology reduces costs and scales to your infrastructure automatically.
Prowler is an AWS security best practices assessment, auditing, hardening, and forensics readiness tool.
Extending your data center temporarily into the cloud during a customer rush might not be easy, but it can be done, thanks to Ansible's Playbooks and some AWS scripts.
Amazon GuardDuty continuously monitors your AWS accounts and workloads for potential threats.