AWS: Automation & Development

Cloud Computing Adaptation

                                                              

Companies are shifting towards cloud computing because it is easy to handle and cost effective. Big brands or companies always look into those factors which can be implemented in their ecosystem to reduce the production cost or maintenance cost. They take all kinds of solutions whether they are manual or technical. One of the solutions they could find is in Cloud Technology. It is the fastest growing technology in the world. There are many players in the market who are providing the computation benefits.



Majority of the market is occupied by AWS  Amazon Web Services. And there is a reason behind this. Companies are easily adapting the AWS environment with their resources. Employees who want change in the work style without any external effect can do so in the AWS interface. Not just 10 but more than 240 Services provided by AWS and it is kept on updating. 

Time Constraints

If I take an example of Nokia - It was the largest mobile phone manufacturing company every 3rd or 4th person around the world were using Nokia Mobile Phones. They were masters of their field at that period of time. Then What happened? Innovation, new ideas, competitions, processing units or processors evolve with time. Nokia which had the majority stakes in the market did not bother to update their machines, their technical branch, their management etc. So as a result the expect of the market involvement decreases and they lose in competitive battle.

Many technical companies, even Amazon, are taking the story lessons from Nokia. That involves time in every aspect of a company. So they keep on modifying their present services and resources.

Mandatory guidelines 

Many companies which are using AWS services are following guidelines. Those guidelines can be termed as baseline configuration or just Security Configurations.

Why do we use it? There are multiple reasons for that. Let's take an example: if a burglar comes on the doorstep, how would I know if they are safe to handle or a violent person. There must be a doorbell or camera installed to identify the person right. In this case the mandatory guidelines of specific AWS services are created for individual Companies. There are common grounds as well from AWS. But companies can invoke this term and conditions to their platform AWS services. 

Let's move forward with example - if the burglar breaks into your private space. What will a normal person do? Will he or she fights back? right. So In terms of the AWS Services this case the fighting configuration is there in the services for example Security Group which allows the whitelisted port numbers to come in and block the blacklisted ports Numbers.



-- The case of a burglar remediation is so similar in operations that a  security operations or Develop/Secops  person does in AWS. 

-- They can use predefined managed configuration rules present in the documentation or they can just create a Config Rule to identify the compliance, non compliance of the client working services.

Managed config rule link - https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html

-- They Remediate the services which has non complaint manually using the automation reference from the documentation or even create a auto-remediation script 

Automation reference link - https://docs.aws.amazon.com/systems-manager/latest/userguide/automation-actions.html


Will discuss the boto3 documentation and how to implement the Python Script auto remediation for a particular case study next week Blog.


Thank You


Comments

Popular posts from this blog

Data analysis with R

Machine learning in Python

AWS: Config Rule & Compliance Check