Secure Secrets Management on AWS SAM with AWS Secrets Manager

Secure Secrets Management on AWS SAM with AWS Secrets Manager

In the ever-evolving landscape of cloud computing, where data security reigns supreme, the management of sensitive information holds the key to a robust and resilient infrastructure. AWS Secrets Manager comes in handy as a crucial guardian of digital assets by providing a secure vault for managing access credentials, API keys, and other critical information on AWS. In this blog, we’ll uncover the significance of AWS Secrets Manager, delving into its pivotal role in secure credential management and seamless integration with…

Read More Read More

API Logging on EKS with CloudWatch

API Logging on EKS with CloudWatch

With the API-first approach of building software products becoming prominent and APIs now making up the most common communication channel for internet traffic, API security becomes paramount.API logging and monitoring is a key component in securing APIs, amongst others that include discovery, vulnerability management and compliance. APIs should have an inbuilt mechanism to collect access and transaction activities which can aid in their monitoring to identify potentially malicious activity. Golang being one of the most popular frameworks for developing APIs…

Read More Read More

Creating a CIS Level 1 Hardened AWS AMI

Creating a CIS Level 1 Hardened AWS AMI

A security baseline configuration defines a set of agreed security configurations that an organization requires to be set during deployment of an infrastructure component such as an operating system. This allows such an organization to implement systems in an efficient and standardized manner as well as ensure that all infrastructure components meet a set of minimum security requirements. The Center for Internet Security (CIS) provides well-defined industry best practice security benchmarks to help organizations assess and improve their infrastructure security….

Read More Read More