AWS Storage Blog
Category: AWS Well-Architected
Automating Amazon FSx for NetApp ONTAP password rotation with AWS Lambda
Data security is a top priority for customers using AWS cloud services. Based on customer input, AWS has “designed-in” methods enabling customers to automate common security workflows such as password rotation. The principals of this automation follows the AWS Well-Architected Framework which helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for a variety […]
Building a disaster recovery site on AWS for workloads on Microsoft Azure
Some enterprises run their IT operations using a multi-cloud environment, often for compliance, cost, or redundancy reasons. At times, these enterprises may be required to host a copy of their data, or even a full disaster recovery (DR) solution, on another cloud provider to provide an additional layer of protection. In this post, we show […]
Ensure workload resilience with AWS Elastic Disaster Recovery and Arpio
Planning for disaster recovery (DR) is a critical component of any IT operations practice. Applications that run on AWS benefit from the reliability that is built into the platform. However, they can still be impacted by from natural disasters, technical failures, and accidental or malicious human actions. Consequently, implementing best practices around disaster recovery is […]
Building a disaster recovery site on AWS for workloads on Google Cloud (Part 2)
One of the design principles to build reliable workloads is to test your recovery procedures. While this is a challenging task in traditional environments (i.e., on-premises), it’s much easier on the cloud because you can predict how your application fails and simulate a failure. You can then validate how your people, technology, and processes work […]
Securely installing AWS Replication Agent using AWS Security Token Service
UPDATE (7/7/2022): We’ve revised this blog post to align with the latest AWS security best practices. We’ve removed the step of adding an AWS Identity and Access Management (IAM) user, and replaced it with using an EC2 instance profile when the source server is an EC2 instance (the AWS Replication Agent also retrieves credentials automatically from […]