Articles on Tech Best Practices
- Secure AWS Deployments with OIDC Learn how to secure AWS deployments using GitHub Actions and OIDC for keyless authentication.
- Build Secure Network Subnet Topology Understand how to design secure and scalable network subnet architectures using subnets.
- Instance/Host Roles in AWS Explore how AWS instance and host roles provide secure, temporary credentials for accessing cloud resources.
- Enable AWS GuardDuty for Threat Detection Learn how to enable AWS GuardDuty to detect threats and monitor your AWS environment.
- AWS CloudTrail: API Logging and Activity Monitoring Learn how AWS CloudTrail records API activity, enables auditing, and helps secure AWS environments.