Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role passing. We look at ways to avoid and detect IAM security holes.
Remain independent of your cloud provider by automatically rolling out virtual machines and applications with Ansible neutral inventory files.
SaltStack is a fast and reliable modular toolbox written in Python that contains ready-made modules for many configuration management purposes.
Pulumi promises a unified interface and surface for orchestrating various clouds and Kubernetes.
The Office 365 Security & Compliance Center provides a unified interface for managing policies and security settings, including retention labels, which specify how data is handled for compliance with internal policies, data protection laws, and tax legislation.
LINSTOR is a toolkit for automated cluster management that takes the complexity out of DRBD management and offers a wide range of functions, including provisioning and snapshots.
A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.
Monitoring with AWS Lambda serverless technology reduces costs and scales to your infrastructure automatically.
Extending your data center temporarily into the cloud during a customer rush might not be easy, but it can be done, thanks to Ansible's Playbooks and some AWS scripts.
Prowler is an AWS security best practices assessment, auditing, hardening, and forensics readiness tool.