Homepage
Open in app
Sign in
Get started
AVM Consulting Blog
AVM Consulting — Clear strategy for your cloud
Follow
Latest
Graphing MySQL Query Histograms
Graphing MySQL Query Histograms
One of the best features within MySQL performance schema is query histograms, and much like in photography, they provide a great deal of…
Vincent Werner
May 25
The Invisible Threat: QR Code Attacks and Defensive Strategies
The Invisible Threat: QR Code Attacks and Defensive Strategies
In today’s fast-paced digital age, QR (Quick Response) codes have become an integral part of our lives. These matrix barcodes are used for…
Security Enthusiast
Nov 27, 2023
Enhancing Data Security with an Effective IT Security Policy
Enhancing Data Security with an Effective IT Security Policy
In today’s interconnected world, data security is of utmost importance for organizations. An IT Security Policy acts as a guiding framework…
Security Enthusiast
Jul 2, 2023
Manage Software Licenses with AWS License Manager
Manage Software Licenses with AWS License Manager
AWS License Manager makes it easier to manage your software licenses from software vendors such as Microsoft, SAP, Oracle, and IBM across…
Kubernetes Advocate
Jun 11, 2023
Cloud Management & Governance with AWS Control Tower
Cloud Management & Governance with AWS Control Tower
If you’re an organization with multiple AWS accounts and teams, cloud setup and governance can be complex and time-consuming, slowing down…
Kubernetes Advocate
Jun 11, 2023
Amazon Fraud Detector
Amazon Fraud Detector
Amazon FAmazon Fraud Detector is a fully managed service that makes it easy to identify potentially fraudulent online activities such as…
Kubernetes Advocate
Jun 11, 2023
Cost Monitoring and Budgets on AWS
Cost Monitoring and Budgets on AWS
The AWS Cost Management console has features that you can use for budgeting and forecasting costs and methods for you to optimize your…
Kubernetes Advocate
Jun 11, 2023
AWS AppSync: Build real-time app experiences with modern GraphQL APIs
AWS AppSync: Build real-time app experiences with modern GraphQL APIs
AWS AppSync simplifies application development by letting you create a flexible API to securely access, manipulate, and combine data from…
Kubernetes Advocate
Jun 11, 2023
Traffic ROUTING TO SPECIFIC MICRO-SERVICES in AWS
Traffic ROUTING TO SPECIFIC MICRO-SERVICES in AWS
AWS App Mesh allows you to implement advanced routing capabilities between your microservices. One of the ways to achieve this is to work…
Kubernetes Advocate
May 7, 2023
Application Networking Service- AWS App Mesh
Application Networking Service- AWS App Mesh
AWS App Mesh provides application-level networking so your services can communicate across multiple types of computing infrastructure.
Kubernetes Advocate
May 7, 2023
AWS S3 bucket permissions with s3 Inspector.
AWS S3 bucket permissions with s3 Inspector.
Tool to check AWS S3 bucket permissions.
Kubernetes Advocate
May 6, 2023
Security Best Practices for Kinesis Data Firehose.
Security Best Practices for Kinesis Data Firehose.
When you use your own Amazon KMS Customer-managed CMKs to protect your Kinesis Data Firehose delivery streams, you have complete control…
Kubernetes Advocate
May 2, 2023
Best practices for administering Amazon FSx file systems
Best practices for administering Amazon FSx file systems
Use KMS Customer Master Keys for FSx Windows File Server File Systems.
Kubernetes Advocate
May 2, 2023
Cross Accounts Networking Via Route53 Resolver
Cross Accounts Networking Via Route53 Resolver
Use the AWS Resource Access Manager to share Route53 Resolver endpoints across AWS accounts.
Kubernetes Advocate
Nov 25, 2022
How to deploy Web Application Firewall in AWS Cloud?
How to deploy Web Application Firewall in AWS Cloud?
We will help you to protect a workload from network-based attacks using AWS Web Application Firewall (WAF) integrated with Amazon…
Kubernetes Advocate
Nov 24, 2022
How to Protect CloudFront distribution with WAF?
How to Protect CloudFront distribution with WAF?
Image result AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits
Kubernetes Advocate
Oct 13, 2022
AWS SQS | AWS Simple Queue Service | How SQS Works |
AWS SQS | AWS Simple Queue Service | How SQS Works |
Amazon Simple Queue Service (SQS) lets you send, store, and receive messages between software components at any volume
Kubernetes Advocate
Oct 9, 2022
Automate the RDS backup function using Lambda
Automate the RDS backup function using Lambda
Lambda can be extremely useful also in different contexts such as automating boring administration tasks
Kubernetes Advocate
Aug 23, 2022
SAML SSO (SINGLE SIGN-ON) for Securing AWS Infrastructure
SAML SSO (SINGLE SIGN-ON) for Securing AWS Infrastructure
SAML, is an open standard for exchanging authentication and authorisation data between parties
Kubernetes Advocate
Aug 23, 2022
Protecting and Securing AWS Accounts with KMS keys
Protecting and Securing AWS Accounts with KMS keys
Allowing anonymous access to your AWS KMS keys is considered bad practice and can lead to sensitive data leakage.
Kubernetes Advocate
Aug 23, 2022
How to Secure AWS accounts with Multi-factor authentication (MFA)
How to Secure AWS accounts with Multi-factor authentication (MFA)
Multi-factor authentication (MFA) in AWS is a best practice that adds an extra layer of protection on top of your user name and pasword
Kubernetes Advocate
Aug 23, 2022
Managing Storage Gateway in AWS
Managing Storage Gateway in AWS
A cloud storage gateway is a hybrid cloud storage device, implemented in hardware or software, which resides at the customer premises
Kubernetes Advocate
Aug 8, 2022
How to configure AWS Landing Zone in AWS?(Terraform)
How to configure AWS Landing Zone in AWS?(Terraform)
This Terraform will create the basic landing zone for a startup to begin building on Amazon Web Services (AWS). It will create the…
Kubernetes Advocate
Aug 7, 2022
AWS S3 Lifecycle Management
AWS S3 Lifecycle Management
An S3 Lifecycle configuration is an XML file that consists of a set of rules with predefined actions that you want Amazon S3 to perform on…
Kubernetes Advocate
Aug 7, 2022
SAML web-based authentication for Security (Single Sign-On (SSO)
SAML web-based authentication for Security (Single Sign-On (SSO)
SAML 2.0 (Security Assertion Mark-up Language) is an umbrella standard that covers federation, identity management and single sign-on…
Kubernetes Advocate
Aug 6, 2022
About AVM Consulting Blog
Latest Stories
Archive
About Medium
Terms
Privacy
Teams