Rohit Shrivastava#40 Shorticles: AWS Security ServicesAWS offers a wide array of security services designed to protect applications, data, and infrastructure. Here are some key AWS security…1d ago1d ago
Rohit Shrivastava#39 Shorticles: DDoS and SQL InjectionDDoS (Distributed Denial of Service) and SQL Injection are two different types of cybersecurity threats, each targeting different aspects…2d ago2d ago
Rohit Shrivastava#38 Shorticles: Application Configuration Security in AWSIn AWS, application configuration typically includes the following elements:2d ago2d ago
Rohit Shrivastava#37 Shorticles: Fine-Grained ControlFine-grained control refers to the ability to specify detailed and precise permissions or rules regarding what actions a user, service, or…2d ago2d ago
Rohit ShrivastavaEnsuring Compliance with S3 Bucket Versioning Using AWS Lambda and AWS ConfigIn today’s digital landscape, data management and compliance are paramount for businesses of all sizes. One essential aspect of data…3d ago3d ago
Rohit ShrivastavaCan we restrict AWS User to access AWS IAM policies?At CloudX Innovations, a developer named Alex was working on a project that required access to EC2 instances and S3 buckets. However, Alex…Sep 16Sep 16
Rohit Shrivastava#36. Shorticles: Curl Command with Different FlagsThe curl command is a powerful tool used for transferring data from or to a server using various protocols (HTTP, HTTPS, FTP, etc.). Here…Jun 10Jun 10
Rohit Shrivastava#35. Shorticles: Docker Commands At-GlanceBelow is a list of commonly used Docker commands along with a brief explanation of each:May 1May 1
Rohit Shrivastava#34. Shorticles: How to access cross-account S3 using AWS Glue.Recently I came across one use case where user wants AWS Glue from one account crawls data from S3 in another account. So, it’s going to be…Aug 29, 2023Aug 29, 2023