AWS Incident Response – Unintended Access to S3 bucket

Incident Type Unintended access to an S3 Bucket Summary This runbook is provided to be used as a template only. It should be customized by administrators working with AWS to suit their particular needs, risks, available tools and work processes. It is not official AWS documentation and is provided as-is to customers using AWS products …

AWS Incident Response – Unintended Access to S3 bucket Read More »

AWS Incident Response – runbook template for Credential leakage

Incident Type Credential Leakage/Compromise Summary These run-books are created to be used as templates only. They should be customized by administrators working with AWS to suit their particular needs, risks, available tools and work processes. These guides are not official AWS documentation and are provided as-is to customers using AWS products and who are looking …

AWS Incident Response – runbook template for Credential leakage Read More »

AWS Incident Response runbooks template – DDoS attack

Incident Type Web Application Dos/DDoS Attack Summary These run-books are created to be used as templates only. They should be customized by administrators working with AWS to suit their particular needs, risks, available tools and work processes. These guides are not official AWS documentation and are provided as-is to customers using AWS products and who …

AWS Incident Response runbooks template – DDoS attack Read More »

Hal yang perlu dilakukan untuk memastikan keamanan minimum di lingkungan AWS anda

Pada kali ini, sesuai dengan topik diatas, banyak interaksi saya dengan pelanggan yang berkonsultasi mengenai bagaimana memastikan kemananan lingkungan AWS mereka secara minimum. Sebenarnya mekanisme ini dibahas lebih detail dengan me-refer pada dokumen-dokumen sebagai berikut https://awssecworkshops.com/, https://wellarchitectedlabs.com/security/, https://d1.awsstatic.com/whitepapers/architecture/AWS-Security-Pillar.pdf dan lain-lain. Secara garis besar, topik-topik minimum yang perlu kita lakukan adalah: Asset Management Identity & Access …

Hal yang perlu dilakukan untuk memastikan keamanan minimum di lingkungan AWS anda Read More »

Configure your domain.com e-Mail using AWS Workmail, Active Directory, Route53, Cloudfront

In this blog, I just would like to give you high level step by step and references if you would like to host your domain’s email (webmail, mail accounts) using AWS Workmail. I used this methods to host my https://mail.priyambodo.com email account. Configure your domain to be hosted on AWS Route53 Create an Active DIrectory …

Configure your domain.com e-Mail using AWS Workmail, Active Directory, Route53, Cloudfront Read More »

Deploy Serverless Web Application on Amazon S3, Amazon Cloudfront (+ IAM), Route53, and Lambda@Edge within minutes

Here I would like to share on the guidance/mechanism to deploy your static website on AWS, or a dynamic website using Web Progressive Application framework such as ReactJS, Angular, Vue. The deployment is not just to deploy it on S3, but also deploy that to cloudfront, configure the domain name, configure the SSL certificate, and …

Deploy Serverless Web Application on Amazon S3, Amazon Cloudfront (+ IAM), Route53, and Lambda@Edge within minutes Read More »

Serverless Lab Guide that you can try!

These are some of the serverless solutions that you can try, which include of web application, user authentication, data processing (data streaming and big data), machine learning, and continuous integration and continuous development (devops). Enjoy the lab! Data processing : https://dataprocessing.wildrydes.com/ Web Application : https://github.com/aws-samples/aws-serverless-workshops/tree/master/WebApplication Authentication : https://github.com/aws-samples/aws-serverless-workshops/tree/master/Auth Machine learning : https://github.com/aws-samples/aws-serverless-workshops/tree/master/MachineLearning and https://image-processing.serverlessworkshops.io/ DevOps …

Serverless Lab Guide that you can try! Read More »