How to authenticate private container registries using AWS Batch

By Dustin Ward

AWS FeedHow to authenticate private container registries using AWS Batch This post was contributed by Clayton Thomas, Solutions Architect, AWS WW Public Sector SLG Govtech. Many AWS Batch users choose to store and consume their AWS Batch job container images on AWS using Amazon Elastic Container Registries (ECR). AWS Batch and Amazon Elastic Container Service…

Create CIS hardened Windows images using EC2 Image Builder

By Dustin Ward

AWS FeedCreate CIS hardened Windows images using EC2 Image Builder Many organizations today require their systems to be compliant with the CIS (Center for Internet Security) Benchmarks. Enterprises have adopted the guidelines or benchmarks drawn by CIS to maintain secure systems. Creating secure Linux or Windows Server images on the cloud and on-premises can involve…

Middleware-assisted Zero-downtime Live Database Migration to AWS

By Dustin Ward

AWS FeedMiddleware-assisted Zero-downtime Live Database Migration to AWS When trying to figure out how to refactor your applications to leverage AWS Managed Services, you have some decisions to make. You may have decided to move your storage layer to AWS before the computational layer. This may help with using advanced database features, in addition to…

Access token security for microservice APIs on Amazon EKS

By Dustin Ward

AWS FeedAccess token security for microservice APIs on Amazon EKS In this blog post, I demonstrate how to implement service-to-service authorization using OAuth 2.0 access tokens for microservice APIs hosted on Amazon Elastic Kubernetes Service (Amazon EKS). A common use case for OAuth 2.0 access tokens is to facilitate user authorization to a public facing…