AWS VPC has multiple items that allows for control of traffic to and from various entities: namely Security-Groups, NACLs, Route-Tables, and WAF. This page is a compilation of information regarding them from various sources.
Continue reading...-
posts
-
AWS Security-Group, NACL, Route-Tables, WAF
-
Samba 9.9 CVE-2021-44142 Vulnerability
Product Versions Protocol Insecure Module Vulnerability CVE # CVSS Samba < 4.13.17 SMB vfs_fruit
Out-of-bounds heap read/write CVE-2021-44142 9.9 -
Very Basic Bash Scripting Guide
This is a very short basic description on Bash scripting - compiled from a book and various online sources. Refer to the reference section for a full reading/understanding.
Continue reading... -
On TLSv1.2 Handshake
TLS is the secure alternative/descendant of SSL which was developed by Netscape to secure internet connections. SSLv1.0 was extremely flawed and never released. However, later versions were widely adopted. In late 2014, Google discovered major flaw in SSLv3.0 which led to development of TLS. Although envisioned as a SSL upgrade,TLSv1.0 was significantly different from SSL but had option to fall back on SSLv3.0
Continue reading... -
Summary: "Principal" in AWS IAM Policies
Continue reading...Principal
is a Resource-based policy element in AWS to specify whether an entity is allowed or denied access to a resource. This means that it can be a part of the policy of a resource like S3 or RDS but not of entities like users, groups, etc. Likewise, in IAM roles,Principal
element tells who can assume the role and who cannot. -
Review of Ethane: Network Architecture for the enterprise
BRIEF OVERVIEW OF ETHANE
Ethane: Network Architecture for the enterprise
Defines single network0wide fine-grain policy and enforces it
Extremely Simple Flow-Based Ethernet Switches and Centralized controller to manage the admittance and routing of flows
Backwards-compatible -
AWS Cloudwatch Review
Brief Explanation of Amazon Config
AWS Config is a fully managed service that provides you with an inventory of your AWS resources, configuration history, and configuration change notifications to enable security and governance. Notifications are provided via Amazon’s simple notification service. With AWS Config, you can discover existing AWS resources, export a complete inventory of your AWS resources, with all configuration details, determine how a resource was configured at any point in time, get notified when resources are created, modified, or deleted, view relationships between resources. For example, how many EC2 instances use a specific security group. This enables compliance auditing, security analysis, resource change tracking, and troubleshooting.
Brief Explanation of Elastic Beanstalk
Elastic Beanstalk allows you to quickly deploy and manage applications within the AWS cloud, without having to configure the infrastructure that runs those applications. Deploying is as simple as uploading the application and Elastic Beanstalk automatically handles capacity provisioning, load balancing and application health monitoring.
-
AWS IAM Quick Review
All details and code taken from AWS IAM documentation page. You can test all your IAM policies usin IAM Policy Simulator.
Continue reading... -
Leetcode 740 - Delete and Earn (Medium)
You are given an integer array nums. You want to maximize the number of points you get by performing the following operation any number of times:
Continue reading... -
Leetcode 70 - Climbing Stairs (Easy)
You are climbing a staircase. It takes n steps to reach the top. Each time you can either climb 1 or 2 steps. In how many distinct ways can you climb to the top?
Continue reading...