Use AWS Config the Right Way for Successful Compliance
It’s well-known that AWS Config is a powerful service for monitoring all changes across your resources. As AWS Config has constantly evolved and improved over the years, it has transformed into a true powerhouse for monitoring your deployment’s compliance. Monitoring for compliance — whether for HIPAA, CIS, internal auditors, etc. — is a detailed and complicated process, and it’s of utmost importance to provide a clear history of all actions so that auditors can easily assess and approve your organization. With that in mind, let’s check out the following three best practices to use AWS Config for Compliance.
Joe Nemer posted a great blog about Compliance best practices on AWS config. Read his blog article here for more info and details.
Architecture diagrams are a great way to communicate your design, deployment, and topology. AWS has published an official collection of AWS Architecture Icons (formerly Simple Icons) that contain AWS product icons, resources, and other tools to help you build diagrams.
Customers and partners are permitted by AWS to use the resources below to create architecture diagrams. The icons are designed to be simple so that you can easily incorporate them in your diagrams and put them in your whitepapers, presentations, datasheets, posters, or any technical material.
Get started with one of these toolkits.
Compatible with Microsoft PowerPoint 2013 and newer (.pptx format).
Cloudability gathered everything you need to know to not only survive, but make the very most of your AWS re:Invent 2018 experience — whether you’re returning or going for the first time, or even following along from the comfort of your own home.
The biggest AWS cloud event of the year is almost here! AWS re:Invent 2018 will take place in Las Vegas November 26th-30th.
You use AWS. It’s secure out of the box, but introducing security issues through misconfiguration is easy…
I found a checklist and I also added the best practices from AWS, this helps me in my daily work to guide me through potential security issues. This can and will help you to tighten up the security of your AWS infrastructure.
The purpose of this article is to remind you of the most urgent security measures that should be taken on your AWS infrastructure. It is by no means exhaustive, and it should be adapted to your specific business use cases.
This again has been a massive year for VMware. So many clouds so many announcements. Here is a quick portfolio guide to what VMware is offering in public clouds from last year until now. Continue reading →
The “big three” public cloud providers are turning their sights to legacy workloads. It will be interesting to see how customers adopt and deploy VMware on AWS, Azure Stack and, now, Google Nested Virtualization.
One knock on public clouds from Google, Amazon, and even Microsoft is that they are terrific for brand-new software built to take advantage of their resources, but not so great for existing, older business software developed and deployed before the cloud era kicked off 10 years ago.
The cloud players are working to address that issue. Many companies don’t necessarily want to rebuild applications that run just fine so they can move to someone else’s cloud data centers.
Always looking for good info and tools for my daily work, I happened to find a website where clouds were compared. I found it so interesting that I found it useful and also want to share it through my blog. The maker have certainly done a good job. Thanks to Jess Panni for sharing this.
VMware Cloud on AWS service is offered in a simple and flexible packaging structure wherein you get VMware’s software capabilities delivered as a service on AWS’s powerful bare-metal infrastructure. Find out more about VMware Cloud Services: http://cloud.vmware.com