<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>AWS on Steyn Huizinga</title><link>https://www.steynhuizinga.nl/categories/aws/</link><description>Recent content in AWS on Steyn Huizinga</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Tue, 11 Feb 2025 14:15:00 +0200</lastBuildDate><atom:link href="https://www.steynhuizinga.nl/categories/aws/index.xml" rel="self" type="application/rss+xml"/><item><title>How Cloudar Drives Industry 4.0 Innovation</title><link>https://www.steynhuizinga.nl/2025/02/how-cloudar-drives-industry-4.0-innovation/</link><pubDate>Tue, 11 Feb 2025 14:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2025/02/how-cloudar-drives-industry-4.0-innovation/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Fourth Industrial Revolution, or Industry 4.0, is transforming the way industries operate by integrating advanced technologies such as IoT, AI, and big data analytics. Companies need expert guidance to navigate this shift efficiently. Cloudar, an AWS Premier Consulting Partner, plays a crucial role in helping businesses leverage cloud technologies to build scalable, secure, and efficient Industry 4.0 applications.&lt;/p&gt;
&lt;h2 id="why-cloudar-for-industry-40"&gt;Why Cloudar for Industry 4.0?&lt;/h2&gt;
&lt;p&gt;Cloudar specializes in AWS solutions tailored for Industry 4.0 needs, ensuring seamless cloud adoption and integration. With deep expertise and a customer-centric approach, with Cloudars 100% focus on AWS, Cloudar helps businesses harness the power of AWS to drive innovation and operational excellence.&lt;/p&gt;</description></item><item><title>Improving IAM policies</title><link>https://www.steynhuizinga.nl/2023/09/improving-iam-policies/</link><pubDate>Thu, 28 Sep 2023 09:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2023/09/improving-iam-policies/</guid><description>&lt;h1 id="security-is-a-shared-responsibility"&gt;Security is a shared responsibility&lt;/h1&gt;
&lt;p&gt;As you might have read in my previous posts, public cloud itself should be considered as very secure. For major cloud providers such as AWS security is key. Security incidents would destroy AWS&amp;rsquo; business so they are fully committed to prevent this from happening. Their almost unlimited access to security talent, extensive knowledge, years of experience, enormous budget, benefit of building things from scratch etc etc are indicators that security is serious business. And looking at the reported incidents compared to the size and scope of their services is impressive. If you are wondering which incidents have been reported, see &lt;a href="https://aws.amazon.com/security/security-bulletins/"&gt;here&lt;/a&gt;. No doubt about security &lt;em&gt;of&lt;/em&gt; the cloud.&lt;/p&gt;</description></item><item><title>High-performance computing on AWS</title><link>https://www.steynhuizinga.nl/2023/06/high-performance-computing-on-aws/</link><pubDate>Thu, 29 Jun 2023 09:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2023/06/high-performance-computing-on-aws/</guid><description>&lt;h1 id="how-does-high-performance-computing-differs-from-regular-computing"&gt;How does High-Performance Computing differs from regular computing?&lt;/h1&gt;
&lt;p&gt;Today&amp;rsquo;s server hardware is powerfull enough to execute most compute tasks. With common compute resources most (serial) computing challenges can be solved. However, some tasks are very complex and require a different approach. Think of cases that require improved speed and efficiency, ability to handle large datasets and flexibility etc. For this HPC will bring massive parallel computing, cluster and workload managers and high-performance components to the table.&lt;/p&gt;</description></item><item><title>Amazon Linux 2023</title><link>https://www.steynhuizinga.nl/2023/04/amazon-linux-2023/</link><pubDate>Fri, 07 Apr 2023 14:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2023/04/amazon-linux-2023/</guid><description>&lt;p&gt;Earlier this month AWS has &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/03/amazon-linux-2023/"&gt;released&lt;/a&gt; Amazon Linux 2023, in short AL2023. Amazon Linux is a Linux distribution maintained by AWS. It is no suprise that the main purpose of this distribution is an optimized experience for running on AWS as it comes with features and intergration with AWS-specific tools. Besides an &lt;a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AMIs.html"&gt;Amazon Linux Image&lt;/a&gt; the distribution is also offered as an &lt;a href="https://hub.docker.com/_/amazonlinux"&gt;container image&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;AL2023 is the last generation of Amazon Linux, the successor of the initial version &lt;a href="https://aws.amazon.com/amazon-linux-ami/"&gt;Amazon Linux&lt;/a&gt; and &lt;a href="https://aws.amazon.com/amazon-linux-2/"&gt;Amazon Linux 2&lt;/a&gt;. With the release of AL2023 AWS will release a new major version every two years. According to the cadence we can expect AL2025, AL2027 and so on. With every upcoming release the current release will go from Standard to Maintanance support (security patches only) to be retired after 3 years. This means that a major version has a supported lifespan of 5 years, which is fairly long in cloud. The new versioning and cadence is new for those that are familiar with the versions Amazon Linux and Amazon Linux 2. The previous versions were a rolling release, while from AL2023 (or in hindsight AL2) onwards a new major version will be released every 2 years.&lt;/p&gt;</description></item><item><title>Getting started with sustainability</title><link>https://www.steynhuizinga.nl/2023/03/getting-started-with-sustainability/</link><pubDate>Mon, 20 Mar 2023 09:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2023/03/getting-started-with-sustainability/</guid><description>&lt;p&gt;Sustainability is an important topic. This is not without a reason, since sustainability is key in preserving our planet. The combined world of sustainability and cloud is getting more and more traction. The investements pay off: we get more capabilities to work with and now it&amp;rsquo;s time to start harvesting. The urgency is also there. ICT, including cloud, is responsible for &lt;a href="https://theshiftproject.org/en/article/lean-ict-our-new-report/"&gt;3% of the global greenhouse gasses emissions&lt;/a&gt;. We, as consumers of cloud resource, easily have impact since making changes to your cloud environment can be done easily (e.g. no hardware to write off).&lt;/p&gt;</description></item><item><title>The five common mistakes on S3</title><link>https://www.steynhuizinga.nl/2022/07/the-five-common-mistakes-on-s3/</link><pubDate>Tue, 26 Jul 2022 10:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2022/07/the-five-common-mistakes-on-s3/</guid><description>&lt;p&gt;
&lt;a href="https://www.steynhuizinga.nl/2022/07/the-five-common-mistakes-on-s3/five-common-mistakes-on-s3.png" data-dimbox data-dimbox-caption="The five common mistakes on S3"&gt;
 &lt;img alt="The five common mistakes on S3" src="https://www.steynhuizinga.nl/2022/07/the-five-common-mistakes-on-s3/five-common-mistakes-on-s3.png"/&gt;
&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;In general the cloud object store Amazon S3 is pretty straightforward to use, but mistakes are easily made. The service itself is proven to be secure (&amp;ldquo;security of the cloud&amp;rdquo;), reliable and performant. However, misconfiguration by the owner of the S3 buckets can give a totally different experience (&amp;ldquo;security in the cloud&amp;rdquo;). In this blog the five most common mistakes will be addressed as a learning experience.&lt;/p&gt;</description></item><item><title>Configure OpenID Connect for GitLab and AWS</title><link>https://www.steynhuizinga.nl/2022/03/configure-openid-connect-for-gitlab-and-aws/</link><pubDate>Tue, 15 Mar 2022 21:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2022/03/configure-openid-connect-for-gitlab-and-aws/</guid><description>&lt;p&gt;We do encounter a mix of DevOps tools being used in cloud project. For reasons we do prefer to work with AWS native tools and services. One of the reasons (but certainly not limited to that) for that opinion is that native tools provide seamless integration with the fundamentals of AWS itself. Think of tight integration with AWS Identity and Access Management (IAM) or AWS CloudTrail. In AWS it&amp;rsquo;s common to assign roles to resources. For exampl,e steps in CodeBuild (&amp;lsquo;build runners&amp;rsquo; in CodePipeline) have an IAM role with least-privileged policies assigned to grant access to the platform. Roles are using short-lived credentials and are provided natively by the platform. The time to live varies per service, but mostly anything between 15 minutes and 6 hours. Way shorter than static credentials, which are most likely to be rotated every 90 days in theory. The reality is that rotating static credentials manually is a big hassle and (almost) nobody does it.&lt;/p&gt;</description></item><item><title>Limiting access using geographic restrictions</title><link>https://www.steynhuizinga.nl/2022/03/limiting-access-using-geographic-restrictions/</link><pubDate>Thu, 03 Mar 2022 15:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2022/03/limiting-access-using-geographic-restrictions/</guid><description>&lt;p&gt;The world is on fire. We&amp;rsquo;re heading towards - or exactly it already is - a humanitarian disaster in Ukraine. We&amp;rsquo;ve all seen the heartbreaking footage from the war. Thousands of homeless people fighting and fearing for their lives. I&amp;rsquo;ve written this blog to help. I do know that a large number of government websites are hosted on AWS.&lt;/p&gt;
&lt;p&gt;The conflict between Ukraine and Russia is expanding with cyber warfare. There is fighting on the ground, but also online. Government websites are taken down, broadcasting companies are being hacked, etc. Everything is done to manipulate and disrupt communication technologies. Although most attacks will be sophisticated, there are some simple measurements in AWS you can take to make it more difficult for attackers. It will not be 100% waterproof. Hackers often use Tor-networks and Command and Control-machines. But every bit helps.&lt;/p&gt;</description></item><item><title>Amazon Inspector 2 - What's new?</title><link>https://www.steynhuizinga.nl/2022/01/amazon-inspector-2-whats-new/</link><pubDate>Mon, 03 Jan 2022 11:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2022/01/amazon-inspector-2-whats-new/</guid><description>&lt;p&gt;Six years after the initial launch AWS announced the new Amazon Inspector. The launch took place during re:Invent 2021. With this launch the previous version has been renamed to Amazon Inspector Classic. The new Amazon Inspector is rearchitected to support a wider range of workloads and simplified workflow management.&lt;/p&gt;
&lt;h1 id="scale-with-simplified-management"&gt;Scale with simplified management&lt;/h1&gt;
&lt;p&gt;The management of Inspector 2 has been simplified. Enabling and configuring the service can be done with a few API calls or, if you persist on manual labor, a few clicks in ClickOps. To give an idea of the steps needed to enable Inspector for both existing and new member accounts, the steps are listed below.&lt;/p&gt;</description></item><item><title>Exploring FinOps KPI's to measure the true value of the cloud</title><link>https://www.steynhuizinga.nl/2021/11/exploring-finops-kpis-to-measure-the-true-value-of-the-cloud/</link><pubDate>Fri, 05 Nov 2021 14:45:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/exploring-finops-kpis-to-measure-the-true-value-of-the-cloud/</guid><description>&lt;p&gt;Michel Zitman (Cloud Financial Management Practice Lead at Oblivion) shares his best practices on how to build efficient FinOps KPIs and demonstrates the importance they have on your FinOps Governance. Cloud cost management appears to be a challenging subject in the majority of organizations. From our experience we have concluded that 35% of cloud spend is actually wasted as a result of over-provisioned resources alone. And given the fact that, on a global scale, we are only at the beginning of cloud adoption, it’s time for action.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/gqWiCWJ7LtI?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Exploring FinOps KPI&amp;#39;s to measure the true value of the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>Keeping up with your cloud knowledge</title><link>https://www.steynhuizinga.nl/2021/11/keeping-up-with-your-cloud-knowledge/</link><pubDate>Fri, 05 Nov 2021 10:45:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/keeping-up-with-your-cloud-knowledge/</guid><description>&lt;p&gt;Livestream session to talk with Maheshwar, Developer Evangelist at AWS, about how to keep up to date with your knowledge on AWS.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/_YOKDfyU-j4?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Keeping up with your cloud knowledge"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Guests: &lt;a href="https://www.linkedin.com/in/sohanmaheshwar/"&gt;Sohan Maheshwar (AWS)&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Best practices for optimizing cost and performance of your Microsoft workloads on AWS</title><link>https://www.steynhuizinga.nl/2021/11/best-practices-for-optimizing-cost-and-performance-of-your-microsoft-workloads-on-aws/</link><pubDate>Fri, 05 Nov 2021 09:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/best-practices-for-optimizing-cost-and-performance-of-your-microsoft-workloads-on-aws/</guid><description>&lt;p&gt;Why is it important to optimize costs? TCO has two main components: infrastructure cost and software licenses cost. The usual optimization scenario is when a customer wants to find compute, storage and licensing configuration that reaches the desired performance level at minimum cost. When you run SQL Server workloads, licensing makes up the majority of the TCO, so this is where you want to optimize. In this session we are going to cover basics of Microsoft licensing on AWS and best practices for compute and licensing optimization of SQL Server workloads on AWS. And finally we will discuss how AWS Optimization and Licensing Assessment (AWS OLA) can help you to see potential cost savings when migrating your Windows Workloads to AWS.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/85OZG67Y-Qk?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Best practices for optimizing cost and performance of your Microsoft workloads on AWS"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>DSM's cloud native journey</title><link>https://www.steynhuizinga.nl/2021/11/dsms-cloud-native-journey/</link><pubDate>Tue, 02 Nov 2021 14:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/dsms-cloud-native-journey/</guid><description>&lt;p&gt;Together with Mark Boon (Senior Digital Engineer @ DSM), Andrès Koetsier (cloud consultant at Oblivion) goes in-dept into how DSM adopted a cloud-native way of working to rapidly develop new applications to solve sustainable challenges.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/PZsSC5RXWy0?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="DSM&amp;#39;s cloud native journey"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Guests: &lt;a href="https://www.linkedin.com/in/mark-boon-4b9151/"&gt;Mark Boon (DSM)&lt;/a&gt; and &lt;a href="https://www.linkedin.com/in/andres-koetsier/"&gt;Andrès Koetsier (Oblivion)&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Data &amp; Security in the cloud</title><link>https://www.steynhuizinga.nl/2021/11/data-security-in-the-cloud/</link><pubDate>Tue, 02 Nov 2021 12:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/data-security-in-the-cloud/</guid><description>&lt;p&gt;Martijn Doedens (Cloud Security Consultant at Oblivion) and Niels Zeilemaker (CTO at GoDataDriven) summarise the current state of secure data processing in the (AWS) cloud. We cover the specific services related to data and the services that are used to standardise secure landing zone, actual risks and threats that our customers face when processing big data on AWS and which configurations (aka best practices) you should always implement.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/e1n8Gv5y7RY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Data &amp;amp; Security in the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>Securing your secrets in the cloud</title><link>https://www.steynhuizinga.nl/2021/11/securing-your-secrets-in-the-cloud/</link><pubDate>Tue, 02 Nov 2021 12:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/securing-your-secrets-in-the-cloud/</guid><description>&lt;p&gt;Have you spotted access keys in code? Putting it directly in your code might not be a good idea. Maybe you saw that Kubernetes offers secrets for this. Have you found your Kubernetes secrets to be readable by everyone? So where do you put your secrets in a secure way? In this session we will look at various solutions, such as Hashicorp Vault, Kubernetes, and solutions offered by AWS.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/lXMRTP5eg9Q?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Securing your secrets in the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>Threat detection and response in the cloud</title><link>https://www.steynhuizinga.nl/2021/11/threat-detection-and-response-in-the-cloud/</link><pubDate>Tue, 02 Nov 2021 11:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/threat-detection-and-response-in-the-cloud/</guid><description>&lt;p&gt;In this session we talk about how to do detection and response in the AWS public cloud and what native AWS services can be used to do this. What options are available and what (if any) 3rd party solutions play a role here? If it was up to us, what are the top use cases a security operations.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/Z4V6uDmptAY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Threat detection and response in the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>Compelling reasons to adopt the public cloud</title><link>https://www.steynhuizinga.nl/2021/11/compelling-reasons-to-adopt-the-public-cloud/</link><pubDate>Mon, 01 Nov 2021 16:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/compelling-reasons-to-adopt-the-public-cloud/</guid><description>&lt;p&gt;Jeroen van der Leer discusses five main reasons modern organizations choose to adopt the public cloud - and why you should too.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/Sp6gpibwHQM?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Compelling reasons to adopt the public cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;
&lt;p&gt;Guests: &lt;a href="https://www.linkedin.com/in/jeroenvanderleer/"&gt;Jeroen van der Leer (Oblivion)&lt;/a&gt;&lt;/p&gt;</description></item><item><title>First glance at AWS CloudFormation Guard 2.0</title><link>https://www.steynhuizinga.nl/2021/05/first-glance-at-aws-cloudformation-guard-2.0/</link><pubDate>Tue, 18 May 2021 22:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/05/first-glance-at-aws-cloudformation-guard-2.0/</guid><description>&lt;p&gt;Yesterday AWS CloudFormation Guard version 2.0 was &lt;a href="https://aws.amazon.com/blogs/mt/introducing-aws-cloudformation-guard-2-0/"&gt;introduced&lt;/a&gt;. Guard is an open source tool that can be used to validate CloudFormation templates against certain rules. You can use it for linting your templates both on syntax and semantics. Linting tools are essential in CI/CD pipelines and an powerful addition when it comes to validating structured and human-readable files such as JSON and YAML. In your delivery pipelines you would preferably run linting tests as early as possible, before proceeding to steps such as compile and deploy steps et cetera(fail-fast).&lt;/p&gt;</description></item><item><title>Defense in depth matters</title><link>https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/</link><pubDate>Wed, 12 May 2021 22:10:56 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/</guid><description>&lt;p&gt;Recently a nasty vulnerability in AWS CloudShell was reported by Google’s Project Zero. Due to a bug in the library handling interaction with the shell and the browser an attacker could trigger remote code execution. AWS CloudShell is a browser based shell which gives a pre-authenticated web-based shell. The service most-often used by a user with administrator privileges on the AWS console.&lt;/p&gt;
&lt;p&gt;Via remote shell the credentials of the user starting AWS CloudShell can be obtained and can be used to call AWS services. Needless to say what the potential impact could have been. It would be easy to blame the developers for this vulnerability, but that would be too short sighted. In general we all know that software is written by humans and that humans are prone to error. We need a more comprehensive approach to protect our digital assets and reputation.

&lt;a href="https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/naarden-vesting.jpeg" data-dimbox data-dimbox-caption="Naarden-Vesting: Dutch version of defence in depth"&gt;
 &lt;img alt="Naarden-Vesting: Dutch version of defence in depth" src="https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/naarden-vesting.jpeg"/&gt;
&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Optimizing your security footprint in AWS — part 2</title><link>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-2/</link><pubDate>Wed, 31 Mar 2021 09:34:32 +0100</pubDate><guid>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-2/</guid><description>&lt;p&gt;In the last few years the costs for running security went skyrocketing. We’ve seen an explosion of security solutions, all fighting for their own place in cybersecurity. I’m pretty sure each solution has its purpose, but from a CISO perspective the landscape is getting more complex and more expensive each year, or friendly phrased: less cost-effective.&lt;/p&gt;
&lt;p&gt;Public cloud is the main driver for innovation. With the arrival of new thinking, new capabilities and reinventing how we run IT things have changed tremendously.&lt;/p&gt;</description></item><item><title>Optimizing your security footprint in AWS — part 1</title><link>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-1/</link><pubDate>Tue, 23 Mar 2021 14:17:49 +0100</pubDate><guid>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-1/</guid><description>&lt;p&gt;In the last few years the costs for running security went skyrocketing. We’ve seen an explosion of security solutions, all fighting for their own place in cybersecurity. I’m pretty sure each solution has its purpose, but from a CISO perspective the landscape is getting more complex and more expensive each year, or friendly phrased: less cost-effective.&lt;/p&gt;
&lt;p&gt;Public cloud is the main driver for innovation. With the arrival of new thinking, new capabilities and reinventing how we run IT things have changed tremendously.&lt;/p&gt;</description></item></channel></rss>