How to Optimize and Visualize Your Security Groups (Jump Host example)

In this post we review how to understand and visualize AWS security groups, and how to use it for identifing security vulnerabilities. What are AWS Security Groups? AWS Security Groups acts as a virtual firewall for your instance to control inbound and outbound … Continue Reading

Who is accessing your Elastic File System (EFS)?

In this post we review how to understand and visualize who is accessing your EFS, and how to use it for troubleshooting, cost allocation and system design. What is Elastic File System (EFS)? Amazon Elastic File System (Amazon EFS) provides … Continue Reading

Who is accessing your data(base)?

Who is accessing my database ??

Here is a deceptively simple question: who is accessing my database (or data)? Who accessed it in the recent three days? That sounds like something that is reasonable to ask and to get an answer for. However in reality, this … Continue Reading

Using VPC Flow Logs to visualize your network

AWS VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC. Flow log data is is a part of the Amazon CloudWatch Logs. After you’ve … Continue Reading