• Home
  • Contact AWS Security Architect
  • Privacy Policy

AWS Security Architect

Experienced AWS, GCP and Azure Security Architect

  • ALBs on AWS
  • APIs on AWS
  • Application Security
  • Automation
  • AWS Backups
  • AWS EC2 Patching
  • AWS Firewall manager
  • AWS IAM
  • AWS Migration
  • AWS Native SIEM
  • AWS Network Security
  • AWS Public APIs
  • Compliance and Audits
  • control tower
  • CSPM on AWS
  • Data Analytics and data Processing
  • EC2 Security
  • File Servers on AWS
  • Governance
    • Compliance
    • Tagging
  • Incident Management on AWS
  • KMS
  • PaaS Security
  • Risk Factors
  • S3 Security
  • Shared VPCs
  • Tableau on AWS
  • Terraform

AWS Migration – The all important Pilot Wave (Wave zero or Wave 1)

anuj varma May 1, 2025 AWS Migration – The all important Pilot Wave (Wave zero or Wave 1)2025-11-02T23:56:36+00:00 AWS Migration No Comment
Pilot Wave – Migration Activities for On-Premises to AWS Pilot Wave – Migration Activities for On-Premises Servers to AWS The following table outlines key activities in the Pilot Wave for…
Continue Reading

AWS KMS CMK Centralization

anuj varma April 3, 2025 AWS KMS CMK Centralization2025-11-03T18:08:15+00:00 KMS 1 Comment
AWS KMS CMK Centralization – Can Keys Be Stored Centrally? Short answer: No, AWS KMS keys (CMKs) cannot be physically stored in a single central account for all workloads to…
Continue Reading

Cutover Options for AWS Migration

anuj varma March 21, 2025 Cutover Options for AWS Migration2025-11-21T15:35:15+00:00 AWS Migration No Comment
AWS Migration Cutover Options AWS Migration Cutover Options 1. Traditional Network Cutover (DNS / IP / Routing Shift) This is the standard approach when migrating workloads using replication tools like…
Continue Reading

Analyzing Terabytes of VPC Flow Log data – Part 2 – Notes from the field

anuj varma June 29, 2024 Analyzing Terabytes of VPC Flow Log data – Part 2 – Notes from the field2024-06-29T04:57:47+00:00 Data Analytics and data Processing No Comment
First  read -  Analyzing Terabytes of VPC Flow Log Data - part 1 Example Workflow Ingestion and Storage: Configure VPC Flow Logs to send logs to an S3 bucket. Use…
Continue Reading

Analyzing Terabytes of VPC Flow Log data – Part 1

anuj varma June 29, 2024 Analyzing Terabytes of VPC Flow Log data – Part 12024-06-29T04:57:26+00:00 Data Analytics and data Processing 1 Comment
Analyzing terabytes of VPC Flow Log data requires a robust and scalable approach to handle the large volume of data efficiently. Here are the key steps and tools involved in…
Continue Reading

Packet Capture and AWS VPC Flow Logs

anuj varma June 29, 2024 Packet Capture and AWS VPC Flow Logs2024-06-29T04:54:20+00:00 AWS Network Security No Comment
Also read PCAP (Packet Capture) overview AWS VPC Flow Logs do not use PCAP (Packet Capture) format. Instead, VPC Flow Logs capture metadata about the traffic flowing to and from…
Continue Reading

PCAP  Overview

anuj varma June 29, 2024 PCAP  Overview2024-06-29T04:48:06+00:00 AWS Network Security 1 Comment
PCAP  Overview PCAP (Packet Capture) files are used to record network traffic data for analysis. They capture and store data packets transmitted over a network, allowing network administrators, security analysts,…
Continue Reading

S3 customer session

anuj varma November 9, 2023 S3 customer session2023-11-09T15:41:58+00:00 S3 Security Enter your password to view comments.
This content is password protected. To view it please enter your password below: Password:
Continue Reading

aws_controltower_control – terraform – preventive and detective control tower controls

anuj varma July 21, 2023 aws_controltower_control – terraform – preventive and detective control tower controls2023-11-09T15:17:40+00:00 control tower Enter your password to view comments.
This content is password protected. To view it please enter your password below: Password:
Continue Reading

AWS EC2 – Proceed without Key Pair

anuj varma December 11, 2022 AWS EC2 – Proceed without Key Pair2022-12-11T14:10:52+00:00 EC2 Security No Comment
While creating the instance , you will be prompted to "Proceed without key pair" . You can still connect to the instance provided: the sshd in your AMI is configured to use…
Continue Reading
«‹45678›»

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • August 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • June 2024
  • November 2023
  • July 2023
  • December 2022
  • October 2022
  • September 2022

Categories

  • ALBs on AWS
  • APIs on AWS
  • Application Security
  • Automation
  • AWS Backups
  • AWS EC2 Patching
  • AWS Firewall manager
  • AWS IAM
  • AWS Migration
  • AWS Native SIEM
  • AWS Network Security
  • AWS Public APIs
  • Compliance
  • Compliance and Audits
  • control tower
  • CSPM on AWS
  • Data Analytics and data Processing
  • EC2 Security
  • File Servers on AWS
  • Governance
  • Incident Management on AWS
  • KMS
  • PaaS Security
  • Risk Factors
  • S3 Security
  • Shared VPCs
  • Tableau on AWS
  • Tagging
  • Terraform
Copyright ©2026. AWS Security Architect
Mesocolumn Theme by Dezzain