Secure Authentication and Configuration Methods for AWS Using Terraform

Never hardcode your AWS credentials directly in your Terraform files. Use environment variables, shared credentials files, or IAM roles to manage your credentials securely. While other secure methods can be found from the official Terraform webpage at Link, I will show you how to configure with “Shared Configuration and Credentials Files” method below. When AWS […]

Secure Authentication and Configuration Methods for AWS Using Terraform Read More »

Simplifying Continuous Delivery on AWS: Combining Magic with Practicality!

In the fast-paced world of software development, making sure those new features and bug fixes reach their destination is key. Traditional deployment methods, with all their manual fuss and time-chewing antics, can really put a damper on your innovation parade. But hang tight! Enter Continuous Delivery Pipelines (CD Pipelines) to save the day. CD Pipelines

Simplifying Continuous Delivery on AWS: Combining Magic with Practicality! Read More »

Amazon ECR Announces Improved Basic Scanning

Amazon Elastic Container Registry (ECR) introduces a significant upgrade to its basic scanning feature, now in preview. This new version leverages Amazon’s own scanning technology to deliver improved vulnerability detection and scanning results across a wider range of popular operating systems. By utilizing this enhanced basic scanning, you can significantly strengthen the security posture of

Amazon ECR Announces Improved Basic Scanning Read More »