AWS

How to Automate AWS IAM Best Practices Using the Principle of Least Privilege
AWS IAM automation with Klotho to help you implement security best practices via Infrastructure-as-Code, and abstracting the complexity of writing least privilege IAM policies away from your developers.

Network Security in the AWS Cloud

Develop AWS Lambda Functions Locally On Your Machine
Develop, build and deploy any AWS resource from your machine using AWS serverless application model (SAM)
Use an Existing ALB/NLB for Your EKS Cluster
How to Set Up AWS Load Balancer Controller in EKS Cluster
Deploying AWS Load Balancer Controller in the preconfigured EKS and configure Ingress routes.

Cluster-Autoscaler | Amazon EKS
Autoscaling is a function that automatically scales resources up or down to meet inconsistent demands. This is a major Kubernetes function that would otherwise require extensive human resources to…
Create a Custom Docker Image/Container & Push to AWS ECR
Build an image from a base image pulled from Docker Hub, create a container on a specified port from that image and push the image to Amazon ECR repository.
The Best Way to Gain an AWS Gold Jacket (12x certifications)
A roadmap for achieving and maintaining the 12 certificates that AWS currently offers. It’s a long and demanding road, but that doesn’t have to discourage you.
Planning to change the AWS KMS key for the S3 bucket with data? Consider these points
How to change the existing customer-managed KMS key associated with an AWS S3 bucket when the bucket contains a massive amount of data.