Cloudreach Blog

Read about industry news, cloud development, employee culture, events and more...

Tooling and Features

Posts in Category

Multi AWS Account federation with Microsoft Azure Active Directory as IdP

Tudor Toma 12th April 2018
When it comes to using Amazon Web Services in an enterprise environment, we think of Identity and Access Management being at the center of everything due to its importance for enterprises. Some of the key solutions which are used today relating to this are: Using a dedicated AWS Account as a central identification point for […]

AWS SSM in Action, the next generation of SSH

Giulio Calzolari 9th March 2018
Over the last year AWS have introduced a lot a of new capabilities to extend the functionality of the EC2 Systems Manager. These features include: Parameters store Automation Patching Run Command State Manager / Inventory At re:Invent 2017, many features were introduced such as SSM PrivateLink and PCI compliance. I decided to investigate SSM SendCommand to […]

How to continuously assess the security of your AMIs

Jawad Seddar 23rd February 2018
Jawad Seddar, Cloud Systems Developer at Cloudreach, gives insight on a continuous AMI assessment process using Amazon Inspector, Lambda and CloudWatch.   Vulnerability assessments   When deploying resources in the cloud or in your datacenters, it’s always recommended to make sure they are not affected by known vulnerabilities as these can easily be leveraged to […]

Are we about to experience a big change in the developer role?

Thomas Linck 11th December 2017
Developers are creative people that want to be mentally stimulated. With developments in Cloud Computing, the job role is changing a lot and we’re expecting code generation to have a big impact on how developers work. How will they feel about this? Developers have been creating software since the beginning of the computer age, and […]

Secret Store Lambda for CloudFormation templates

Giulio Calzolari 2nd November 2017
One topic very important in the AWS ecosystem is how to share secrets and parameters between applications. Popular tools such as Vault and Consul are oriented towards large enterprises with multiple levels of security. There are also other proprietary KMS systems which often require connectivity back to on premise locations. Another alternative may be a […]
1 2 3 5