In the previous article of this 2-part blog, I outlined how Row-Level security can be implemented using Amazon Spectrum and Redshift.
This post deals with how tables and schemas can be created manually as part of row-level security.
Cloudy, with a chance of Downtime
Stephen McMaster's Personal Cloud and Technology Blog
In the previous article of this 2-part blog, I outlined how Row-Level security can be implemented using Amazon Spectrum and Redshift.
This post deals with how tables and schemas can be created manually as part of row-level security.
Part of the challenge of using some reporting applications on AWS is the limited connectors that are often available.
A recent challenge required reporting on data that was held in S3 and also to apply row-level security to that data. The reporting application in question did not have connectors for S3 but could connect to a database.
This article describes how I achieved this using AWS services.
This article is in two parts – Part I (this part) describes the configuration of the components at a high level. The next article will discuss how the objective can be automated.
This article provides instructions on how to obtain a certificate thumbprint for an OIDC provider on AWS in an automated manner. Although this approach was created with EKS in mind, the same approach with work with other OIDC providers.
Working Java code is also provided.
This post describes how you can implement EC2 Volatile Memory Capture in AWS.
Last week, I attended re:Invent 2019 with Deloitte – an Emerald Sponsor.
Reflecting on an action-packed week, this blog post brings you some of the key highlights of the week, and my own personal takeaways.
This blog-post explains the contention between CSPs and Regulators and how Cloud HSM can help organisations mitigate exposure to the consequences of that legislation.
This article explains the high-level approaches of AWS Landing Zones, and AWS Control Tower, and the benefits and limitations of each service