We are going to be talking about AWS Identity and Access Management (IAM) beginning with this post. If you have read through the previous two AWS posts then you should have already set up a labuser account and admin group.
Continue readingTag Archives: Information Security
Docker Images
We have set up Docker and introduced the Docker Hub in the previous Discovering Docker posts. In this post we will discuss Docker images and how they are used and then in the next post we will create a Docker image.
Continue readingSecuring The AWS Root User Account Part 1
A new AWS account will include a root user account that will be initially configured with a single sign-in identity. This account will be able to access all AWS services and resources and it must be protected. It is considered best practice to not use this account for our everyday tasks. This includes administrative tasks which should be completed via an IAM User with administrative privileges.
continue readingThe Docker Hub
We started Docker and ran our first container in the previous Docker post by pulling an image from the Docker Hub. Docker Hub is similar to GitHub. We use GitHub to store code to be shared internally or externally to our organizations. Docker Hub enables us to do the same thing with our Docker images. Docker provides the ability to store publicly hosted images as well as privately hosted images.
continue readingDocker 101 – Installation Of Docker
We are going to introduce Docker in this post. Our goal in the Docker series will be to first demonstrate installation of Docker, configuration of the Docker hub, Docker images, and the Docker file to show how to create your own images.
continue reading