Tag Archives: Information Security

Securing The AWS Root User Account Part 1

A new AWS account will include a root user account that will be initially configured with a single sign-in identity. This account will be able to access all AWS services and resources and it must be protected. It is considered best practice to not use this account for our everyday tasks. This includes administrative tasks which should be completed via an IAM User with administrative privileges.

continue reading

The Docker Hub

We started Docker and ran our first container in the previous Docker post by pulling an image from the Docker Hub. Docker Hub is similar to GitHub. We use GitHub to store code to be shared internally or externally to our organizations. Docker Hub enables us to do the same thing with our Docker images. Docker provides the ability to store publicly hosted images as well as privately hosted images.

continue reading