This blog post is about AWS cloud information security policies on data privacy. AWS customer maintains ownership and control of their content, including control over what content they choose to store or process using AWS services, which AWS services they use with their content, the Region(s) where their content is stored, the format, structure and…
Author: Isaac Oben
In addition to known information security standards and benchmarks such as NIST, ISO 27000, some cloud providers have native security benchmarks and standards for the respective cloud platform. For this blog post, I am going to write about the Amazon Web Services (AWS) Foundational Security Best Practices standard. This standard implement security controls that detects…
When searching the internet looking for ways of exporting Amazon EC2 instances running within an AWS account, you will get results mostly referencing some CLI or JSON scripts. Well, if you are not into CLI or JSON, you can accomplish the same goals using the newly added AWS Systems Manager Operations Management feature called –…
Amazon AppStream 2.0 can be federated with G Suite third-party SAML 2.0 which will allow users to access the stack and start streaming applications. This blog post will walk you through the steps to successfully configure and enable federation for AppStream 2.0 stack using Google (G Suite) as the identity provider (IdP). Before you begin,…