Category: Security, Identity, & Compliance
ipdata Founder Jonathan Kosgei covers how he built a highly scalable API with low latency globally on AWS API Gateway and how his company handled Authorization, Rate Limiting, High Availability, and DDoS protection.
Security is often viewed as too difficult or that it requires too many special skills to do well. That’s ridiculous. It’s a core part of development and operations. After all, who wants to write bad code or constantly fix an unstable service?
Segment receives billions of events from our customers daily and has grown into dozens of AWS accounts. Expanding into many more accounts was necessary in order to best align with our GDPR and security initiatives. In order to continue scaling gracefully, we are centrally managing employee access to AWS with terraform and our identity provider. To organize the expansion into numerous accounts, we needed a mechanism to control our accounts, which accounts employees have access to, and each employee’s permissions in each account.
An AWS Solutions Architect walks through implementing an additional layer of authentication security for your EC2 instances by requiring two-factor authentication for administrators to use SSH to connect.
When you’re building new web applications and simultaneously trying to grow your customer base, there are a lot of competing concerns you…
AWS tools help you build and optimize cloud-powered mobile applications across multiple platforms.