Latest posts

Change layout
Amazon S3 Glacier

What Is Amazon S3 Glacier and How to Use It

What Is Amazon S3 Glacier and How to Use It

Amazon S3 is one of the core services offered by AWS that has a wide variety of use cases, from serving static websites to hosting images, managing data, and much more. In this post, we will review the ins and outs of Amazon S3 Glacier, a special storage class of Amazon S3 that serves as a cost-effective tool for low-access, long-term storage such as archives required for compliance. Continue reading

AWS S3

Pre-Signed URLs Use-Cases

Pre-Signed URLs Use-Cases

Amazon S3 buckets protection is a critical security measure when using AWS. There have been numerous bad stories about unprotected S3 buckets, from established contractors like Accenture and Booz Allen Hamilton to huge companies like Verizon Wireless and Time Warner Cable. In this article, you will learn how to enhance the security of S3 buckets with pre-signed S3 URLs, and how to generate them for various cases.
Continue reading

AWS Free Tier Cloud Messaging

How You Can Use AWS Free Tier: SQS, SNS, SES

How You Can Use AWS Free Tier: SQS, SNS, SES

This is the third in a three-part series covering the Amazon Web Services (AWS) free tier. In our previous articles, we reviewed the free tier for the AWS compute and database offerings. In this article, you will learn about the messaging options provided by AWS. We will cover Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), and Amazon Simple Email Service (SES). Continue reading

IAM Identities

Amazon S3 Security Part 3: IAM Identities

Amazon S3 Security Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading

IAM Identities

AWS Security Part 2: Basics of IAM Policies

AWS Security Part 2: Basics of IAM Policies

This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading

IAM Identities

AWS Security Part 1: ACLs vs Bucket Policies vs IAM

AWS Security Part 1: ACLs vs Bucket Policies vs IAM

To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading