<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AWS Blog Archives | Cloudar</title>
	<atom:link href="https://cloudar.be/category/awsblog/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudar.be/category/awsblog/</link>
	<description>100% Focus On AWS // 100% Customer Obsession</description>
	<lastBuildDate>Thu, 09 Jan 2025 10:13:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Achievement Unlocked: Global Security &#038; Compliance Acceleration on AWS</title>
		<link>https://cloudar.be/awsblog/achievement-unlocked-global-security-compliance-acceleration-on-aws/</link>
		
		<dc:creator><![CDATA[Team Cloudar]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 10:08:36 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Cloudar news]]></category>
		<category><![CDATA[Company news]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Managed Services]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22511</guid>

					<description><![CDATA[<p>Achievement Unlocked: Global Security &#38; Compliance Acceleration on AWS Cloudar has achieved the AWS Global Security &#38; Compliance Acceleration (GSCA) certification, underscoring our commitment to providing secure, compliant cloud solutions. For AWS users, this milestone brings several benefits, helping them streamline operations, meet compliance requirements, and ensure the highest levels of security. &#160; About the [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/achievement-unlocked-global-security-compliance-acceleration-on-aws/">Achievement Unlocked: Global Security &#038; Compliance Acceleration on AWS</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Achievement Unlocked:<br />
Global Security &amp; Compliance Acceleration on AWS</h1>
<p><em>Cloudar has achieved the AWS Global Security &amp; Compliance Acceleration (GSCA) certification, underscoring our commitment to providing secure, compliant cloud solutions. For AWS users, this milestone brings several benefits, helping them streamline operations, meet compliance requirements, and ensure the highest levels of security.</em></p>
<p>&nbsp;</p>
<p><strong>About the AWS Global Security &amp; Compliance Acceleration Program</strong></p>
<p>AWS designed the GSCA program to support partners in strengthening the security and compliance of cloud environments. Through the GSCA program, we have gained access to advanced training, resources, and AWS experts, enabling us to fine-tune our security capabilities and stay ahead of ever-evolving threats.</p>
<p>This program emphasizes automation, governance, and continuous monitoring, empowering us to proactively address security challenges and scale securely in the cloud.</p>
<p>&nbsp;</p>
<p><strong>Enhanced security posture</strong></p>
<p>With this certification, Cloudar can provide customers with ready-to-go security solutions, customized to fit their unique requirements. From secure infrastructure setup to automated incident response, we can ensure your workloads are protected from day one.</p>
<p>By adhering to AWS’s best practices, we can ensure that your infrastructure is secure by design. We leverage tools like AWS Security Hub, Amazon GuardDuty and AWS Config to provide customers with continuous threat detection, rapid incident response, and real-time insights into security events. This means your business can identify and mitigate risks before they escalate.</p>
<p>&nbsp;</p>
<p><strong>Regulatory compliance</strong></p>
<p>Compliance is no longer an afterthought. Cloudar uses AWS-native tools to continuously monitor for regulatory compliance and offers pre-built templates to help meet industry standards, reducing the time and effort required to maintain compliance.</p>
<p>Whether your business operates in a heavily regulated industry like healthcare, finance, or government, the GSCA certification ensures that we can help you meet key regulatory requirements such as GDPR, HIPAA, SOC 2, and more.</p>
<p>&nbsp;</p>
<p><strong>Faster time-to-market:</strong></p>
<p>By automating security and compliance processes such as patch management, configuration drift detection, and log monitoring, we can significantly reduce the time it takes to implement secure, compliant workloads on AWS.</p>
<p>Cloudar ensures that our customers can maintain a high security posture without the overhead of manual intervention. This leads to lower operational costs and more efficient resource allocation, so you can focus on innovation and growth, while we handle the complexities of cloud security.</p>
<p>&nbsp;</p>
<p><strong>Cloudar helps you leverage the power of AWS Security</strong></p>
<p>Cloudar&#8217;s approach goes beyond simply implementing AWS’s built-in tools. We work closely with your teams to tailor solutions that fit your specific business needs, ensuring that you get the most out of the AWS cloud while keeping your data secure and compliant.</p>
<p>We design cloud architectures that follow AWS’s security best practices, but are customized to fit the scale, complexity, and compliance needs of your business.</p>
<p>Whether you&#8217;re migrating to the cloud or optimizing existing workloads, Cloudar ensures a smooth integration of AWS security services with your current operations.</p>
<p>But our support doesn’t stop after deployment: Cloudar continuously monitors your cloud environment, ensuring you stay compliant and secure as your business grows.</p>
<p>&nbsp;</p>
<p><strong>The Cloudar Difference</strong></p>
<p>At Cloudar, we understand that security and compliance aren’t just checkboxes &#8211; they’re critical to building trust with your customers and staying ahead in a competitive market.</p>
<p>By achieving the Global Security &amp; Compliance Acceleration on AWS, Cloudar once again proves that we are not just a partner, but a trusted ally in your cloud journey.</p>
<p>We provide peace of mind that your AWS workloads are not only running efficiently but are also secured against threats and aligned with the latest regulatory standards.</p>
<p>&nbsp;</p>
<p>If you’d like to learn more about how Cloudar can enhance your cloud security and compliance, or if you&#8217;re ready to take your AWS workloads to the next level, don’t hesitate to get in touch with our team today!</p>
<p>The post <a href="https://cloudar.be/awsblog/achievement-unlocked-global-security-compliance-acceleration-on-aws/">Achievement Unlocked: Global Security &#038; Compliance Acceleration on AWS</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloudar at AWS re:Invent 2024 – Your Guide to an Unforgettable Experience</title>
		<link>https://cloudar.be/awsblog/cloudar-at-aws-reinvent-2024-your-guide-to-an-unforgettable-experience/</link>
		
		<dc:creator><![CDATA[Daan Theunis]]></dc:creator>
		<pubDate>Thu, 17 Oct 2024 11:39:26 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[AWS re:Invent]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22332</guid>

					<description><![CDATA[<p>Cloudar at AWS re:Invent 2024 – Your Guide to an Unforgettable Experience &#160; We’re thrilled to announce that Cloudar will be attending AWS re:Invent 2024 in Las Vegas! As the biggest annual gathering for cloud enthusiasts, experts, and innovators, AWS re:Invent offers countless opportunities to learn, connect, and discover what’s new in the world of [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/cloudar-at-aws-reinvent-2024-your-guide-to-an-unforgettable-experience/">Cloudar at AWS re:Invent 2024 – Your Guide to an Unforgettable Experience</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Cloudar at AWS re:Invent 2024 – Your Guide to an Unforgettable Experience</h2>
<p>&nbsp;</p>
<p>We’re thrilled to announce that Cloudar will be attending AWS re:Invent 2024 in Las Vegas! As the biggest annual gathering for cloud enthusiasts, experts, and innovators, AWS re:Invent offers countless opportunities to learn, connect, and discover what’s new in the world of cloud technology. But with so much happening—from keynotes to hands-on labs, networking sessions to deep-dive discussions—it can sometimes feel overwhelming to navigate everything this event has to offer.</p>
<p>That’s why we initially developed our <strong>re:</strong><strong>Invent Chatbot</strong>, a friendly assistant designed to make your re:Invent experience smoother and more enjoyable! While we’re excited to share the concept, due to AWS guidelines, the chatbot will not be available for use at this year’s event. However, the development of this tool still serves as a great example of how cloud-driven AI can transform the event experience.</p>
<p>&nbsp;</p>
<h3><strong>Meet the re:Invent Chatbot – A Vision for Personalized Event Assistance</strong></h3>
<p>Even though the chatbot is offline for now, it’s an exciting demonstration of how technology can make large-scale events like AWS re:Invent easier to navigate. Whether you&#8217;re searching for the perfect session, need quick answers to FAQs, or just want help organizing your schedule, the chatbot was designed with the user in mind.</p>
<p>Here’s what the re:Invent Chatbot <strong>would</strong> have been able to do:</p>
<ul>
<li><strong>Session Navigation</strong>: With hundreds of sessions happening at once, it’s easy to lose track. Our chatbot could help you quickly find sessions that match your interests or needs—just ask for recommendations, and you’d be pointed in the right direction.</li>
<li><strong>Answer FAQs</strong>: From event logistics to session details, the chatbot was equipped with a wealth of knowledge to answer questions on the fly.</li>
</ul>
<p>&nbsp;</p>
<p><strong><img fetchpriority="high" decoding="async" class="wp-image-22333 alignnone" src="https://cloudar.be/wp-content/uploads/2024/09/Chatbot.png" alt="" width="1171" height="597" srcset="https://cloudar.be/wp-content/uploads/2024/09/Chatbot.png 1663w, https://cloudar.be/wp-content/uploads/2024/09/Chatbot-768x392.png 768w, https://cloudar.be/wp-content/uploads/2024/09/Chatbot-1536x783.png 1536w, https://cloudar.be/wp-content/uploads/2024/09/Chatbot-1280x653.png 1280w" sizes="(max-width: 1171px) 100vw, 1171px" /></strong></p>
<h3></h3>
<p>&nbsp;</p>
<h3>Taking it Further: Imagine a Chatbot for Music Festivals</h3>
<p>Let’s take the concept one step further. Imagine attending a large music festival with dozens of stages and hundreds of performers over a few days. It can be daunting to decide who to see and when. That’s where a <strong>Music Festival Chatbot</strong> could come in handy.</p>
<p>For example, you could tell the chatbot your favorite genres—let’s say you’re into electronic music, indie rock, and a bit of jazz on the side. The chatbot could take that input and instantly suggest a personalized lineup for you, complete with the times and locations of each performance. It could also help you with last-minute schedule changes or even recommend food trucks or merch stands nearby during set breaks.</p>
<p>Here&#8217;s what this <strong>Music Festival Chatbot</strong> could do:</p>
<ul>
<li><strong>Personalized Lineup Recommendations</strong>: Based on your music preferences, the chatbot could suggest artists, DJs, or bands you might enjoy, even introducing you to new acts within your favorite genres.</li>
<li><strong>Time Schedule:</strong> Once your lineup is set, the chatbot could create a custom schedule for you which you could use throughout the event.</li>
</ul>
<p>Just like our re:Invent Chatbot concept, this Music Festival Chatbot shows the potential of AI to personalize experiences, turning chaotic, multi-day events into seamless, curated adventures.</p>
<p>&nbsp;</p>
<h3>Why Build a Chatbot?</h3>
<p>At Cloudar, we believe that technology should make life simpler, not more complicated. The re:Invent Chatbot embodies that philosophy. By leveraging cloud-based AI, we aimed to enhance attendees’ experiences, reducing the stress of juggling schedules or missing key moments.</p>
<p>Though the tool won&#8217;t be live this year, we hope it sparks inspiration for the many possibilities that cloud technologies can offer in the future. And, of course, we’ll be keeping this idea in our toolkit for future events.</p>
<p>&nbsp;</p>
<h3>Let’s Connect in Las Vegas!</h3>
<p>We can’t wait to see you at AWS re:Invent 2024! If you’re attending, don’t hesitate to reach out—we’d love to grab a cold beer together and chat about all things cloud. Whether you want to talk about AWS, share your re:Invent experience, or discuss how tools like the re:Invent Chatbot could evolve, we’re always eager to connect.</p>
<p>The post <a href="https://cloudar.be/awsblog/cloudar-at-aws-reinvent-2024-your-guide-to-an-unforgettable-experience/">Cloudar at AWS re:Invent 2024 – Your Guide to an Unforgettable Experience</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>EPPM: Forecasting Energy Prices with Precision</title>
		<link>https://cloudar.be/awsblog/eppm-forecasting-energy-prices-with-precision/</link>
		
		<dc:creator><![CDATA[Team Cloudar]]></dc:creator>
		<pubDate>Mon, 17 Jun 2024 07:50:34 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Cloudar news]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22119</guid>

					<description><![CDATA[<p>Imagine waking up to a world where you know tomorrow&#8217;s energy prices well before your morning coffee. Every day at precisely 2 a.m., ENTSOE releases the hourly electricity prices for the upcoming day, a critical piece of information for both consumers and businesses to manage their energy consumption effectively. But what if you could see [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/eppm-forecasting-energy-prices-with-precision/">EPPM: Forecasting Energy Prices with Precision</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine waking up to a world where you know tomorrow&#8217;s energy prices well before your morning coffee. Every day at precisely 2 a.m., ENTSOE releases the hourly electricity prices for the upcoming day, a critical piece of information for both consumers and businesses to manage their energy consumption effectively. But what if you could see these prices not just a day in advance, but up to two weeks ahead? Enter EPPM (Electricity Price Prediction Model), a groundbreaking tool that leverages AWS native services to predict electricity prices with remarkable accuracy.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="alignnone wp-image-22122" src="https://cloudar.be/wp-content/uploads/2024/06/EPPM-1-650x433.png" alt="" width="576" height="384" srcset="https://cloudar.be/wp-content/uploads/2024/06/EPPM-1-650x433.png 650w, https://cloudar.be/wp-content/uploads/2024/06/EPPM-1-325x217.png 325w" sizes="(max-width: 576px) 100vw, 576px" /></p>
<h6>1 day published by ENTSOE</h6>
<p><img decoding="async" class="alignnone size-full wp-image-22120" src="https://cloudar.be/wp-content/uploads/2024/06/Picture2-EPPM.png" alt="" width="544" height="240" /></p>
<h6>12 days predicted by EPPM</h6>
<p>&nbsp;</p>
<h3><strong>The Need for Advanced Forecasting</strong></h3>
<p>In our era of energy efficiency and cost management, accurate electricity price predictions are a game-changer. For businesses, this means optimizing operations and reducing costs. For consumers, it translates to better planning and substantial savings. EPPM employs state-of-the-art machine learning algorithms and AWS services to deliver highly accurate electricity price predictions.</p>
<p>&nbsp;</p>
<h3><strong>How EPPM Works</strong></h3>
<p>EPPM utilizes a comprehensive approach, integrating various data sources and sophisticated analytical techniques to generate precise forecasts. Here’s a step-by-step breakdown of the process:</p>
<p>&nbsp;</p>
<ul>
<li><strong>Data Collection</strong>: Every day at 3 a.m., our system kicks off data collection using AWS Step Functions. We gather information from multiple sources, including weather data, historical energy prices, and other relevant factors, all stored in Amazon S3.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Data Preprocessing</strong>: The raw data undergoes meticulous cleaning and processing using AWS Step Functions and AWS Lambda, ensuring consistency and reliability—the foundation for accurate predictions.</li>
</ul>
<p><strong><img loading="lazy" decoding="async" class="alignnone wp-image-22124" src="https://cloudar.be/wp-content/uploads/2024/06/EPPM-3-1-650x433.png" alt="" width="596" height="397" srcset="https://cloudar.be/wp-content/uploads/2024/06/EPPM-3-1-650x433.png 650w, https://cloudar.be/wp-content/uploads/2024/06/EPPM-3-1-325x217.png 325w" sizes="auto, (max-width: 596px) 100vw, 596px" /></strong></p>
<ul>
<li><strong>Model Training</strong>: Every Monday, new models are trained using Amazon SageMaker with the latest datasets. Hyperparameters are optimized, and the most effective model is saved in Amazon S3 for future predictions.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Prediction Generation</strong>: Leveraging the best-performing model, predictions are generated daily using Amazon ECS at 11 a.m. These forecasts offer a detailed view of hourly electricity prices for the upcoming weeks, saved into another S3 bucket.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Data Delivery</strong>: The predicted data is delivered via a REST API running inside AWS ECS on a Fargate container. This API is consumed by a frontend application, also running as a Fargate container, ensuring scalability, reliability, and seamless integration. Users can select date ranges and view comprehensive graphs comparing predicted and actual prices through an intuitive interface.</li>
</ul>
<p><strong><img loading="lazy" decoding="async" class="alignnone size-full wp-image-22127" src="https://cloudar.be/wp-content/uploads/2024/06/EPPM-4-1.png" alt="" width="602" height="241" /></strong></p>
<p><strong><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-22128" src="https://cloudar.be/wp-content/uploads/2024/06/EPPM-5-1-602x433.png" alt="" width="602" height="433" /></strong></p>
<p>&nbsp;</p>
<h3><strong>Real-World Applications</strong></h3>
<p>The applications of EPPM are extensive. Businesses can optimize their energy consumption by scheduling energy-intensive operations during low-cost periods. Utility companies can better balance supply and demand, reducing the risk of outages. Regulatory bodies can use these insights to develop policies that promote sustainable energy practices.</p>
<p>&nbsp;</p>
<h3><strong>Conclusion</strong></h3>
<p>Predicting electricity prices weeks in advance is set to revolutionize energy management. EPPM not only provides this capability but does so with exceptional precision and dependability, thanks to AWS native services. As EPPM evolves, it promises to make a significant impact on the energy sector, driving efficiency and sustainability.</p>
<p>Imagine a future where energy usage is perfectly optimized, leading to substantial savings and a greener planet. With EPPM, that future is within reach.</p>
<p>The post <a href="https://cloudar.be/awsblog/eppm-forecasting-energy-prices-with-precision/">EPPM: Forecasting Energy Prices with Precision</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet our Pinbot Powered by Claude</title>
		<link>https://cloudar.be/awsblog/meet-our-pinbot-powered-by-claude/</link>
		
		<dc:creator><![CDATA[Team Cloudar]]></dc:creator>
		<pubDate>Mon, 10 Jun 2024 08:35:07 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AWS Blog]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22101</guid>

					<description><![CDATA[<p>Get to know our #AWSome Pinball Break Room At Cloudar, our break room isn’t just for coffee breaks – it’s the battleground for the legendary ‘Pinball Grand Champion Cup.’  &#8211; a prestigious, though temporary, ownership. Every few months, we swap out the pinball machine, igniting a fresh round of competition. This means that every three [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/meet-our-pinbot-powered-by-claude/">Meet our Pinbot Powered by Claude</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span lang="EN">Get to know our #AWSome Pinball Break Room</span></h3>
<p>At Cloudar, our break room isn’t just for coffee breaks – it’s the battleground for the legendary ‘Pinball Grand Champion Cup.’  &#8211; a prestigious, though temporary, ownership. Every few months, we swap out the pinball machine, igniting a fresh round of competition. This means that every three to six months, we must ‘relearn’ a new game, which, while fun, can be a distraction from our actual (#AWSome) work. Some of us embrace the challenge as a delightful learning experience, while others simply want to know how to do multi-balls &amp; gain extra bonusses.</p>
<h3>Enter Claude Chatbot (aka Pinbot)</h3>
<p>But, learning each new game can be a bit of a time sink, right? That’s where our latest creation, <a href="https://cloudar.be/awsblog/claude-chatbot-on-aws/">the Claude Chatbot on AWS</a>, comes into play. It is a chatbot with RAG (Retrieval-Augmented Generation) capabilities. This means Claude can be loaded up with a wealth of knowledge from various sources like PDFs, YouTube videos, spreadsheets, even webpages.</p>
<p>Instead of loading Claude with legal texts or company manuals, I thought, &#8220;Why not make him a pinball wizard?&#8221; So, I programmed Claude to become the ultimate guide for our Teenage Mutant Ninja Turtle pinball machine. I fed it YouTube videos of expert players, detailed rule sheets, and tips on mastering the game. In just a few minutes, TMNT Pinbot was ready to roll.</p>
<h3><span lang="EN"><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-22103" src="https://cloudar.be/wp-content/uploads/2024/06/Picture1-571x433.png" alt="" width="571" height="433" /><img loading="lazy" decoding="async" class="alignnone wp-image-22109" src="https://cloudar.be/wp-content/uploads/2024/06/Screenshot-2024-06-10-094606-650x433.png" alt="" width="572" height="381" srcset="https://cloudar.be/wp-content/uploads/2024/06/Screenshot-2024-06-10-094606-650x433.png 650w, https://cloudar.be/wp-content/uploads/2024/06/Screenshot-2024-06-10-094606-325x217.png 325w" sizes="auto, (max-width: 572px) 100vw, 572px" /></span></h3>
<h3><span lang="EN">Playing Like a Pro</span></h3>
<p>Imagine standing in front of the pinball machine, unsure of your next move. You simply ask TMNT Pinbot, &#8220;How do I play as Michelangelo?&#8221; and within seconds, it gives you the exact shots you need to make. No more endless YouTube searches – instant answers and higher scores. This saves time, and increases revenue (or in this case; your score on a pinball game). Plus, the Pinbot can reference its sources, so you can see exactly where the tips are coming from.</p>
<h3><span lang="EN">Beyond Pinball: Claude&#8217;s Endless Possibilities</span></h3>
<p>Sure, the Pinbot is a fun &amp; quick gimmick, but Claude Chatbot&#8217;s potential goes far beyond gaming. Picture a world where your company’s entire knowledge base is just a question away. Need to check a guideline? Ask Claude. Trying to find a procedure buried in a mountain of documents? Claude’s got it. This isn’t just about saving time – it’s about enhancing productivity and ensuring consistency across the board; no more risky &#8220;creative&#8221; interpretations of your procedures/documentation.</p>
<h3><span lang="EN">Real-World Applications</span></h3>
<p>Imagine a repair bot for mechanics. Instead of combing through bulletins for error code 678, a mechanic could just ask the bot and get immediate, accurate suggestions. Or think about a compliance bot that ensures all your creative marketing ideas meet company policies. No more guessing if your booth design follows the AWS logo rules – just ask the bot, and it’ll tell you.</p>
<h3><span lang="EN">The Future is Conversational</span></h3>
<p>The Pinbot is just a fun demo, but it shows how powerful conversational interfaces can be. As we continue to refine our Claude Chatbot&#8217;s capabilities, we’re excited to see how this technology will revolutionize workplaces; From saving time to ensuring compliance. The future of work is conversational, and Cloudar is leading the charge.</p>
<p>Stay tuned for more use cases!</p>
<p>&nbsp;</p>
<p>The post <a href="https://cloudar.be/awsblog/meet-our-pinbot-powered-by-claude/">Meet our Pinbot Powered by Claude</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Start Leveraging the Power of Generative AI with Our Claude Chatbot on AWS</title>
		<link>https://cloudar.be/awsblog/claude-chatbot-on-aws/</link>
		
		<dc:creator><![CDATA[Team Cloudar]]></dc:creator>
		<pubDate>Tue, 21 May 2024 10:25:08 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Cloudar news]]></category>
		<category><![CDATA[Company news]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22066</guid>

					<description><![CDATA[<p>Introduction At Cloudar, we are always on the lookout for innovative ways to enhance our operations and provide top-notch services to our clients. That&#8217;s why we&#8217;re excited to introduce our Claude Chatbot, an AI-powered chatbot running entirely on AWS infrastructure. This powerful tool utilizes Aurora VectorDB, AWS Bedrock, and Claude Opus/Sonnet/Haiku to offer a customizable, [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/claude-chatbot-on-aws/">Start Leveraging the Power of Generative AI with Our Claude Chatbot on AWS</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduction</h2>
<p>At Cloudar, we are always on the lookout for innovative ways to enhance our operations and provide top-notch services to our clients.</p>
<p>That&#8217;s why we&#8217;re excited to introduce our Claude Chatbot, an AI-powered chatbot running entirely on AWS infrastructure.</p>
<p>This powerful tool utilizes Aurora VectorDB, AWS Bedrock, and Claude Opus/Sonnet/Haiku to offer a customizable, efficient, and secure solution for all your chatbot needs.</p>
<h2></h2>
<h2></h2>
<h2><img loading="lazy" decoding="async" class="alignnone size-full wp-image-22075" src="https://cloudar.be/wp-content/uploads/2024/05/Picture4.png" alt="" width="624" height="305" /></h2>
<h2></h2>
<p>&nbsp;</p>
<h2>Customizing Your Chatbot</h2>
<p>One of the standout features of Claude Chatbot is its customizability. You can tailor the chatbot to meet your specific needs by uploading your own knowledge base. This makes the chatbot not only a general assistant but also an expert in your chosen domain.</p>
<ul>
<li><strong>Upload Documentation:</strong> Prepare the documentation or information you want the chatbot to know. This could be anything from company policies to technical manuals.</li>
<li><strong>Train the Chatbot:</strong> Upload this documentation to the chatbot. The AI will process this information and integrate it into its knowledge base, making it a permanent part of its understanding.</li>
<li><strong>Create Custom Bots:</strong> You can create multiple bots for different purposes. For instance, at Cloudar, we have a bot specifically for internal use that contains detailed information about our company.</li>
<li><strong>Expose as API:</strong> Any custom chatbot with custom knowledge can be exposed as an API, allowing other applications to interact with it seamlessly.</li>
</ul>
<p>Claude can support a wide range of knowledge sources, including but not limited to URLs, PDFs, Office files, text files, and even YouTube videos (links)!</p>
<p>&nbsp;</p>
<h2></h2>
<h2><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-22073" src="https://cloudar.be/wp-content/uploads/2024/05/Picture2-650x433.png" alt="" width="650" height="433" srcset="https://cloudar.be/wp-content/uploads/2024/05/Picture2-650x433.png 650w, https://cloudar.be/wp-content/uploads/2024/05/Picture2-325x217.png 325w" sizes="auto, (max-width: 650px) 100vw, 650px" /></h2>
<h2></h2>
<p>&nbsp;</p>
<h2>Generative AI: The Core of Claude Chatbot</h2>
<p>Claude Chatbot leverages the power of Generative AI to provide advanced capabilities that go beyond simple query responses. By using generative models, Claude can:</p>
<ul>
<li><strong>Generate Detailed Responses:</strong> Craft detailed, contextually relevant responses based on the input it receives.</li>
<li><strong>Understand Nuanced Queries: </strong>Handle complex and nuanced questions with ease, providing accurate and helpful answers.</li>
<li><strong>Adapt and Learn:</strong> Continuously improve its performance based on interactions and newly uploaded knowledge.</li>
</ul>
<h2></h2>
<p>&nbsp;</p>
<h2>Benefits of Using Claude Chatbot</h2>
<p>By leveraging Claude Chatbot, you gain several advantages:</p>
<ul>
<li><strong>Enhanced AI Capabilities:</strong> The Claude models (Opus, Sonnet, and Haiku) provide state-of-the-art natural language understanding and generation.</li>
<li><strong>Generative AI Power:</strong> With Generative AI at its core, Claude Chatbot can create meaningful and contextually appropriate responses, enhancing user experience.</li>
<li><strong>Data Ownership:</strong> All your data is stored within your AWS account, ensuring you retain complete control over your information.</li>
<li><strong>Easy Customization:</strong> Tailor the chatbot to your needs by uploading specific documentation, making it a valuable tool for both internal and external use.</li>
<li><strong>API Integration:</strong> Expose your custom chatbot as an API, enabling seamless interaction with other applications.</li>
<li><strong>Scalability:</strong> Running on AWS infrastructure means the chatbot can scale effortlessly with your needs, whether you&#8217;re a small startup or a large enterprise.</li>
<li><strong>Seamless Billing: </strong>All usage and charges are billed through your AWS bill. No new contracts required.</li>
</ul>
<h2></h2>
<p>&nbsp;</p>
<h2>Setting Up Claude Chatbot</h2>
<p>Deploying the Claude Chatbot is a breeze, thanks to its seamless integration with AWS. Here&#8217;s how we do it:</p>
<ol>
<li><strong>Provisioning Your AWS Account:</strong> We take care of setting up your AWS account, ensuring all necessary services are ready to go.</li>
<li><strong>One-Click Deployment:</strong> With just one click, we deploy the full infrastructure to your AWS account, thanks to the AWS Cloud Development Kit (CDK). This includes, but is not limited to:</li>
</ol>
<ul>
<li><strong>Aurora VectorDB</strong> for optimized data handling</li>
<li><strong>AWS Bedrock</strong> to support AI applications</li>
<li><strong>API Gateway (APIGW) </strong>for managing API requests</li>
<li><strong>Lambda</strong> Functions for serverless compute</li>
<li><strong>S3</strong> Buckets for scalable storage</li>
<li><strong>DynamoDB</strong> for fast and flexible NoSQL database services</li>
<li>And more necessary AWS services to ensure a robust and scalable deployment</li>
</ul>
<ol start="3">
<li><strong>Aftercare and Support:</strong> Our commitment doesn&#8217;t end at deployment. We provide comprehensive aftercare and support to ensure your Claude Chatbot runs smoothly and efficiently.</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-22071" src="https://cloudar.be/wp-content/uploads/2024/05/Picture3-650x433.png" alt="" width="650" height="433" srcset="https://cloudar.be/wp-content/uploads/2024/05/Picture3-650x433.png 650w, https://cloudar.be/wp-content/uploads/2024/05/Picture3-1300x867.png 1300w, https://cloudar.be/wp-content/uploads/2024/05/Picture3-325x217.png 325w" sizes="auto, (max-width: 650px) 100vw, 650px" /></p>
<h2></h2>
<p>&nbsp;</p>
<h2>Case Study: Cloudar&#8217;s Custom Chatbot</h2>
<p>At Cloudar, we have multiple custom bots at our disposal:</p>
<ul>
<li><strong>Internal Knowledge Bot:</strong> This bot is equipped with detailed information about Cloudar, assisting us in everything related to our company.</li>
<li><strong>AWS Services Bot:</strong> This bot contains comprehensive knowledge about some of the major AWS services, helping our team stay informed and up-to-date.</li>
</ul>
<p>These custom bots have significantly improved our efficiency and reduced the time spent searching for information.</p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>Claude Chatbot represents a significant step forward in AI-driven customer service and internal assistance. Its integration with AWS infrastructure makes it a robust, scalable, and secure solution. By leveraging Claude&#8217;s <strong>Generative AI</strong> capabilities and customizing the chatbot with your own knowledge base, you can transform the way you interact with your clients and team members.</p>
<p>Ready to get started? Let us handle the setup and deployment, and experience the future of AI-powered assistance with Claude Chatbot on your AWS account today.</p>
<p>&nbsp;</p>
<p>The post <a href="https://cloudar.be/awsblog/claude-chatbot-on-aws/">Start Leveraging the Power of Generative AI with Our Claude Chatbot on AWS</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Shop Local</title>
		<link>https://cloudar.be/awsblog/shop-local/</link>
		
		<dc:creator><![CDATA[Tom De Blende]]></dc:creator>
		<pubDate>Mon, 22 Jan 2024 08:11:13 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[FinOps]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=21968</guid>

					<description><![CDATA[<p>Why choose a Local AWS Partner over a Global System Integrator? At Cloudar, we pride ourselves on being the only local Premier AWS partner in Belgium. While global system integrators (GSIs) offer their services on a massive scale, we believe that being a smaller, local player comes with unique advantages. In this post, we&#8217;ll explore [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/shop-local/">Shop Local</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Why choose a Local AWS Partner over a Global System Integrator?</h2>
<p>At Cloudar, we pride ourselves on being the only local Premier AWS partner in Belgium. While global system integrators (GSIs) offer their services on a massive scale, we believe that being a smaller, local player comes with unique advantages. In this post, we&#8217;ll explore the benefits of partnering with a local AWS expert like us compared to working with a large GSI.</p>
<h3>1. Personalized Attention and Customized Solutions</h3>
<p>Unlike larger firms where clients might feel like just another number, we provide personalized attention to each of our clients. Our team takes the time to understand your specific needs, crafting customized AWS solutions that align perfectly with your business objectives. This tailored approach ensures that your company receives the exact support it needs to thrive.</p>
<h3>2. Agility and Flexibility</h3>
<p>In today&#8217;s fast-paced business world, agility is key. Our smaller size allows us to make quick decisions and adapt to your needs rapidly. This flexibility extends to our service offerings, ensuring scalability that supports your business&#8217;s growth every step of the way.</p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-21969 aligncenter" src="https://cloudar.be/wp-content/uploads/2024/01/tim-mossholder-qvWnGmoTbik-unsplash-2000x1200-1-650x433.jpg" alt="" width="650" height="433" srcset="https://cloudar.be/wp-content/uploads/2024/01/tim-mossholder-qvWnGmoTbik-unsplash-2000x1200-1-650x433.jpg 650w, https://cloudar.be/wp-content/uploads/2024/01/tim-mossholder-qvWnGmoTbik-unsplash-2000x1200-1-1300x867.jpg 1300w, https://cloudar.be/wp-content/uploads/2024/01/tim-mossholder-qvWnGmoTbik-unsplash-2000x1200-1-325x217.jpg 325w" sizes="auto, (max-width: 650px) 100vw, 650px" /></p>
<p>&nbsp;</p>
<h3>3. Local Market Understanding</h3>
<p>Our in-depth knowledge of the Belgian market sets us apart. We&#8217;re not just AWS experts; we&#8217;re experts in how AWS services can best be utilized in Belgium, considering local regulations and market trends. This local insight is invaluable for ensuring compliance and tailoring solutions that work best in our specific market environment.</p>
<h3>4. Direct Communication and Stronger Relationships</h3>
<p>Working with us means you&#8217;ll have direct access to our team of experts. At Cloudar we don&#8217;t work with offshoring or nearshoring. This ease of communication fosters stronger, more meaningful relationships. We&#8217;re not just a service provider; we&#8217;re a partner invested in understanding and contributing to the long-term success of your business.</p>
<h3>5. Competitive Pricing and Cost-Effectiveness</h3>
<p>We offer competitive pricing that challenges larger GSIs, ensuring that you receive top-notch AWS services without an exorbitant price tag. This cost-effectiveness is part of our commitment to providing value, ensuring that your investment in AWS services yields the maximum return.</p>
<h3>6. Community Engagement and Support</h3>
<p>As a local business, we&#8217;re deeply involved in the Belgian community. We believe in supporting local initiatives and contributing to the local economy. By choosing us, you&#8217;re not just getting an AWS partner; you&#8217;re contributing to the broader community and fostering local business ecosystem growth.</p>
<p>&nbsp;</p>
<p>Choosing a local AWS partner like Cloudar offers a range of benefits that large global system integrators can&#8217;t match. From personalized service to local market expertise, our team is dedicated to providing the best possible AWS solutions tailored to your specific needs. If you&#8217;re looking for an AWS partner that values your business and is committed to your success, look no further. Contact us today to discuss how we can help your business thrive with AWS.</p>
<p>The post <a href="https://cloudar.be/awsblog/shop-local/">Shop Local</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Elevating cloud security to new heights: Cloudar earns AWS Security Competency!</title>
		<link>https://cloudar.be/elevating-cloud-security-to-new-heights-cloudar-earns-aws-security-competency/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Tue, 26 Sep 2023 07:49:47 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Cloudar news]]></category>
		<category><![CDATA[Company news]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=21033</guid>

					<description><![CDATA[<p>Introduction At Cloudar, we&#8217;ve always believed that security should be at the heart of every cloud strategy. Our commitment to delivering top-notch cloud security solutions has led us to achieve numerous milestones, and today, we&#8217;re excited to announce our latest achievement: Cloudar has earned the prestigious AWS Security Competency! Building on our ISO/IEC 27001 certification [&#8230;]</p>
<p>The post <a href="https://cloudar.be/elevating-cloud-security-to-new-heights-cloudar-earns-aws-security-competency/">Elevating cloud security to new heights: Cloudar earns AWS Security Competency!</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduction</h2>
<p>At Cloudar, we&#8217;ve always believed that security should be at the heart of every cloud strategy. Our commitment to delivering top-notch cloud security solutions has led us to achieve numerous milestones, and today, we&#8217;re excited to announce our latest achievement: <strong>Cloudar has earned the prestigious AWS Security Competency!</strong></p>
<p>Building on our ISO/IEC 27001 certification since 2018 and our existing AWS competencies, this accomplishment marks a significant milestone in our journey to provide the highest level of security and service to our customers. In this blog post, we&#8217;ll dive into what the AWS Security Competency means for us and, more importantly, what benefits it brings to our valued customers.</p>
<p>&nbsp;</p>
<h2>What is AWS Security Competency?</h2>
<p>The AWS Security Competency is not just a fancy title; it&#8217;s a recognition of excellence in designing, implementing, and managing security solutions on the Amazon Web Services platform. AWS awards this competency to organizations that demonstrate exceptional proficiency in securing AWS workloads and infrastructure.</p>
<p>&nbsp;</p>
<h2>Why it matters</h2>
<h3>Expertise You Can Trust</h3>
<p>Achieving the AWS Security Competency is a rigorous process that involves a deep evaluation of an organization&#8217;s expertise in various security domains such as identity and access management, data protection, compliance, and more.<br />
This achievement is a seal of approval from Amazon Web Services itself.<br />
It means that Cloudar&#8217;s team of experts possesses a comprehensive understanding of AWS security best practices, threat detection, and incident response. It signifies that we have demonstrated proficiency and skill in protecting your cloud infrastructure and data, giving you peace of mind that your assets are in capable hands.</p>
<h3>Cutting-Edge Solutions</h3>
<p>Our team at Cloudar stays at the forefront of security technology. Achieving the AWS Security Competency ensures that we are equipped with the latest knowledge and tools to keep your AWS environments secure from evolving threats.<br />
Our partnership with Trend Micro played a crucial role in this accomplishment. Trend Micro is a global leader in cloud security, and our collaboration has allowed us to leverage their cutting-edge technology and expertise to enhance our security solutions. Together, we&#8217;ve created a formidable team dedicated to safeguarding our customers&#8217; cloud environments.</p>
<h3>Dedication to Continuous Improvement</h3>
<p>Security is not a static field; it&#8217;s an ever-evolving landscape. To maintain this competency, Cloudar continues to invest in training and staying up-to-date with the latest security trends and technologies. We are committed to providing our customers with the most advanced security solutions available.</p>
<h3>Proven Track Record</h3>
<p>Our attainment of this competency underscores our extensive experience in designing, implementing, and managing secure AWS solutions.<br />
We understand that one-size-fits-all security solutions rarely work. Cloudar&#8217;s expertise allows us to tailor security measures to your unique needs, ensuring that your AWS environment is both secure and efficient. We&#8217;ve successfully tackled complex security challenges for customers across various industries, consistently delivering exceptional results.</p>
<p>&nbsp;</p>
<h2>Benefits for our customers</h2>
<h3>Compliance Assurance</h3>
<p>As an ISO/IEC 27001 certified company, Cloudar understands the importance of compliance.<br />
With Cloudar&#8217;s AWS Security Competency, you can trust us to help you meet and exceed regulatory compliance requirements. Our deep understanding of AWS services ensures that your cloud infrastructure aligns with industry-specific standards, making audits and certifications a breeze.</p>
<h3>Enhanced Security Posture</h3>
<p>With our AWS Security Competency and other AWS competencies, you gain access to top-tier security practices and expertise.<br />
We go above and beyond to ensure your AWS environments are fortified against potential threats and vulnerabilities, significantly reducing the risk of data breaches and disruptions.</p>
<h3>Cost Savings</h3>
<p>Investing in security is an investment in your business&#8217;s longevity. By preventing costly breaches and downtime, Cloudar&#8217;s expertise can save you substantial financial resources in the long run.</p>
<h3>Increased Efficiency</h3>
<p>Our tailored security solutions are designed to integrate seamlessly with your existing AWS environment. This ensures that security measures do not impede your operations, allowing for increased efficiency and productivity.</p>
<h3>Peace of Mind</h3>
<p>In the event of a security incident, Cloudar&#8217;s well-practiced incident response teams are ready to spring into action. Our proactive security measures help mitigate threats before they become major issues, minimizing downtime and data loss.<br />
With Cloudar as your trusted AWS Security Competency partner, you can focus on growing your business, knowing that your cloud infrastructure is fortified against threats. Sleep better at night, knowing that experts are on guard.</p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>Achieving the AWS Security Competency is not just an accolade for Cloudar; it&#8217;s a testament to our unwavering dedication to providing the highest level of security for our customers’ AWS environments.</p>
<p>We are committed to keeping your data safe, your operations efficient, and your business thriving. Your cloud&#8217;s security is our priority, and together, we&#8217;ll reach new horizons.</p>
<p>To learn more about how Cloudar can secure your AWS environment and help your business grow securely, contact us today and experience the difference of working with an AWS Security Competency holder!</p>
<p>&nbsp;</p>
<p>The post <a href="https://cloudar.be/elevating-cloud-security-to-new-heights-cloudar-earns-aws-security-competency/">Elevating cloud security to new heights: Cloudar earns AWS Security Competency!</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Managing Instances in Private Subnets with Session Manager or Instance Connect</title>
		<link>https://cloudar.be/awsblog/managing-instances-in-private-subnets-with-session-manager-or-instance-connect/</link>
		
		<dc:creator><![CDATA[Bart Coddens]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 07:02:02 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=20871</guid>

					<description><![CDATA[<p>1. How the Internet evolved and became more hostile As the Internet evolved from a small interconnect between universities where every resource had a public IP address, and resources were managed based on mutual respect and consensus to the Internet as we know it today with multiple threads, risks, and shortage of IP addresses, the [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/managing-instances-in-private-subnets-with-session-manager-or-instance-connect/">Managing Instances in Private Subnets with Session Manager or Instance Connect</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>1. How the Internet evolved and became more hostile</h2>
<p>As the Internet evolved from a small interconnect between universities where every resource had a public IP address, and resources were managed based on mutual respect and consensus to the Internet as we know it today with multiple threads, risks, and shortage of IP addresses, the direct and public accessibility of all resources could no longer be sustained.</p>
<p>As stated in the security pillar of the Well Architected Framework, the main security principle in AWS Cloud is to create several network layers and defense in depth.</p>
<p>The framework states more specifically: “Do not place resources in public subnets of your VPC unless they absolutely must receive inbound network traffic from public sources” <a href="https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/sec_network_protection_create_layers.html">SEC05-BP01 Create network layers</a>.</p>
<p>So as a best practice, cloud engineers strive to deploy their resources in private subnets whenever possible. Because of the confidential nature of these subnets, engineers had to invent ways to manage their resources in these private subnets.</p>
<h2>2. How to Use Jump / Bastion Hosts to Manage Your Private Subnets</h2>
<p>A solution to manage the infrastructure in your private subnets is to deploy a bastion host. Before 2018, this was the recommended way, and it was well-documented:</p>
<p>For Linux Workloads:<br />
<a href="https://aws.amazon.com/solutions/implementations/linux-bastion/">https://aws.amazon.com/solutions/implementations/linux-bastion/</a></p>
<p>For Windows Workloads:<br />
<a href="https://aws.amazon.com/solutions/implementations/rd-gateway/">https://aws.amazon.com/solutions/implementations/rd-gateway/</a></p>
<p>Although these solutions do solve the problem stated above (how to manage your Linux and/or Windows workloads in their private subnets), these solutions have several drawbacks:</p>
<ul>
<li>These solutions still need a public IP address to be associated with the virtual machines and open ports to enable remote access.</li>
<li>The Linux solution is vulnerable to SSH multiplexing access.</li>
<li>As with all software that is publicly accessible, they need to be strictly maintained and patched:
<ul>
<li><a href="https://www.bleepingcomputer.com/news/security/remote-desktop-zero-day-bug-allows-attackers-to-hijack-sessions/">https://www.bleepingcomputer.com/news/security/remote-desktop-zero-day-bug-allows-attackers-to-hijack-sessions/</a></li>
<li><a href="https://www.microsoft.com/en-us/security/blog/2021/09/02/a-deep-dive-into-the-solarwinds-serv-u-ssh-vulnerability/">https://www.microsoft.com/en-us/security/blog/2021/09/02/a-deep-dive-into-the-solarwinds-serv-u-ssh-vulnerability/</a></li>
</ul>
</li>
<li>It&#8217;s hard to capture the remote access&#8217;s metadata and/or full session logs.</li>
<li>Password management and access control are needed for the management users.</li>
</ul>
<p>Because IT is all about answering questions, we are looking for an answer to this question: ‘How can I manage my resources in private subnets in a secure, encrypted, and auditable fashion?’ Luckily, AWS came up with two solutions that answer this question.</p>
<h2>3. AWS Systems Manager’s New Session Manager</h2>
<p>AWS listened to the drawbacks inherent to using bastion/jump hosts and introduced the Session Manager service as a component of AWS Systems Manager. The Session Manager supports both inside AWS and on-premises:</p>
<ul>
<li>Windows</li>
<li>Linux</li>
<li>MacOS</li>
</ul>
<p>This blog post will focus on using it with Elastic Compute Cloud (EC2) Linux instances running in AWS.</p>
<p>&nbsp;</p>
<h3>3.1 Why AWS Session Manager</h3>
<p><a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-getting-started.html">Session Manager</a> solves the problem mentioned above: to access instances within private subnets that don’t allow ingress connections from the Internet. This is made possible by the Systems Manager (SSM) agent running on the EC2 instances, which pushes traffic to the Session Manager service managed by AWS outside your EC2 environment. The configuration shown in the diagram below provides an example of how it can be configured:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20883" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding1.jpg" alt="" width="605" height="340" /></p>
<p>As you can see in the diagram above, the client machine is outside of AWS. It accesses the internal machines over the Internet using valid user credentials for the AWS environment. To access the internal machines, the client can use several methods:</p>
<p>Via the AWS console, you have two-fold access:</p>
<ul>
<li>The AWS Systems Manager console includes access to all the Session Manager capabilities for both administrators and end users.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20884" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding2.png" alt="" width="392" height="386" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20885" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding3.png" alt="" width="756" height="172" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20886" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding4.png" alt="" width="756" height="433" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20887" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding5.png" alt="" width="756" height="131" /></p>
<ul>
<li>The Amazon EC2 console allows end users to connect to the EC2 instances for which they have been granted session permissions.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20889" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding6.png" alt="" width="756" height="375" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20890" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding7.png" alt="" width="756" height="131" /></p>
<p>• Via the AWS Command Line Interface (CLI): this requires the installation of the Session Manager Plugin. It is possible to restrict how users launch sessions, so you could choose only to allow them to invoke a connection via the AWS CLI if your users don’t have access to the console or the other way around.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20891" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding8.png" alt="" width="756" height="175" /></p>
<p>• The Session Manager SDK consists of libraries and sample code that allows application developers to build front-end applications, such as custom shells or self-service portals for internal users that natively use Session Manager to connect to managed nodes. This allows you to integrate Session Manager into your own tooling or automation workflows.</p>
<h3>3.2 Configuration</h3>
<h4>3.2.1 Network Considerations</h4>
<p>As shown in the diagram above, the SSM agent actually uses HTTPS to communicate with the SSM endpoint. As such, port 22 for SSH or port 3389 for RDP are no longer required and should not be allowed as ingress traffic. To make this even more secure, we can use VPC endpoints: they use AWS PrivateLink, so traffic between the target EC2 instances and the Session Manager service does not traverse the Internet. To enable this, create these VPC endpoints in your target VPCs, replacing the region accordingly, for example, eu-west-1</p>
<h5>Interface endpoints:</h5>
<ul>
<li>
<h5>com.amazonaws.[region].ssm</h5>
</li>
<li>
<h5>com.amazonaws.[region].ssmmessages</h5>
</li>
<li>
<h5>com.amazonaws.[region].ec2messages</h5>
</li>
<li>
<h5>com.amazonaws.[region].ec2 [For Windows workloads]</h5>
</li>
</ul>
<h5>Optional but recommended:</h5>
<ul>
<li>
<h5>com.amazonaws.[region].kms = To encrypt logs in CloudWatch</h5>
</li>
<li>
<h5>com.amazonaws.[region].logs = To send logs to CloudWatch</h5>
</li>
</ul>
<h5>Gateway endpoint:</h5>
<ul>
<li>
<h5>com.amazonaws.region.s3</h5>
</li>
</ul>
<p>Systems Manager uses this endpoint to update SSM Agent and to perform patching operations. Systems Manager also uses this endpoint for tasks like uploading output logs that you choose to store in S3 buckets, retrieving scripts or other files you store in buckets, and so on.</p>
<p>If you restrict egress networking on the EC2 machines via security groups, you should use the prefix list of the S3 gateway endpoint to send traffic to this gateway endpoint only. Here is an example of security group configuration for a tightly controlled EC2 instance:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20894" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding9-1.png" alt="" width="605" height="99" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20893" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding10.png" alt="" width="605" height="96" /></p>
<p>&nbsp;</p>
<p>As the interface endpoints replace the DNS addresses of the SSM services, the network traffic with the configuration listed above only flows over AWS PrivateLink. You can even further limit access to the S3 buckets that SSM uses by using the structure listed in the AWS documentation: <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/ssm-agent-minimum-s3-permissions.html">S3 bucket list</a></p>
<h4>3.2.2 EC2 Prerequisites and IAM Configuration</h4>
<h5>EC2 Prerequisites</h5>
<p>The EC2 instance should run the Systems Manager (SSM) agent to support the Systems Manager. The Amazon Linux AMIs support the agent by default, and it can be installed manually on other Linux systems by <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-manual-agent-install.html">installing the Systems Manager</a>. The agent allows a lot more than just connecting with Session Manager. More information about its capabilities is available <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/what-is-systems-manager.html">here</a>. Even if you want to use it on a system that is <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/operating-systems-and-machine-types.html#prereqs-operating-systems">not currently</a> supported, you can always download the <a href="https://github.com/aws/amazon-ssm-agent">open-source</a> code and modify it yourself. However, AWS will not support a modified version of the agent.</p>
<h5>IAM Configuration</h5>
<p>Each EC2 Instance must have permission to make API calls to the Session Manager Service. All necessary permissions are available in the Amazon-managed IAM policy: <strong>AmazonSSMManagedInstanceCore</strong>, and this policy should be attached to an Instance profile.</p>
<p>The policy listed above gives you a good baseline, but if you want to lock this down further, you can look up the information <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/getting-started-create-iam-instance-profile.html">here</a>.</p>
<p>Using this method to access the instances does not require any management of SSH keys. Access is only based on IAM policies since everything is managed through the Session Manager.</p>
<p>When configuring Session Manager access for your end-users, you can limit which instances they can access, whether it’s through the command line or the console, and if they are allowed to tunnel SSH or just use the regular Session Manager shell access.<br />
More information about how to configure the IAM policies is available <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager-getting-started-restrict-access.html">here</a>.</p>
<p>Some AWS policy templates show how to restrict access to specific EC2 instances, but that will probably not be scalable if you really want to implement this for your organization.</p>
<p>Instead, you can refer to the templates available <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/getting-started-restrict-access-examples.html#restrict-access-example-instance-tags">here</a> to see how to configure the policies to allow access based on tags. As shown <a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/getting-started-restrict-access-examples.html#restrict-access-example-user-sessions">here</a>, you will also want to ensure you add permissions for users to terminate only the sessions they started. Otherwise, a user may be able to terminate another user’s session.</p>
<h3>3.3. Logging</h3>
<h4>3.3.1. What the AWS CloudTrail Does</h4>
<p>Without configuring anything, AWS CloudTrail will collect basic information about sessions. When someone launches a remote access session with Session Manager, SSM will log an event named “StartSession.” This event will include a number of interesting things, such as:</p>
<ul>
<li>The username that launched the session</li>
<li>Whether the user was authenticated with multi-factor authentication (MFA)</li>
<li>The originating IP address</li>
<li>The unique ID of the target EC2 instance</li>
<li>The session ID</li>
</ul>
<p>The events in CloudTrail are helpful for getting a sense of who’s logging into your instances and when it’s happening. However, it does not provide any information about what they are doing once they’ve established a session.</p>
<h4>3.3.2. Session logs</h4>
<p>As mentioned in the overview of AWS Session Manager, SSM uses HTTPS to establish sessions, but it is also possible to use it as a tunnel for other protocols, such as SSH or RDP. Be aware that AWS cannot provide full session logs for those connections if you use the tunneling option. The diagram below shows an example configuration for logging full session data either to CloudWatch or S3 when tunneling is not used:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20895" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding11.jpg" alt="" width="605" height="340" /></p>
<p>The logs in CloudWatch look like this:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20896" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding12.png" alt="" width="1386" height="511" srcset="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding12.png 1386w, https://cloudar.be/wp-content/uploads/2023/09/Afbeelding12-768x283.png 768w, https://cloudar.be/wp-content/uploads/2023/09/Afbeelding12-1280x472.png 1280w" sizes="auto, (max-width: 1386px) 100vw, 1386px" /></p>
<p>Next to the CloudWatch logs, logging into S3 is also possible.</p>
<p>Please make sure that you attach a policy to your instance profile that allows writing to the S3 bucket you configured to store your session data. The result is that you will see log files written to the specified bucket with the name of the session (the username and a unique string). The logs contain the commands typed, along with their output, which is the same as what is shown in CloudWatch.</p>
<h3>3.4. Conclusion</h3>
<p>The question: “How can I manage my resources in private subnets in a secure, encrypted, and auditable fashion?” is answered by using the Systems Manager Sessions Manager.</p>
<h2>4. Instance Connect and Instance Connect Endpoint</h2>
<p>As there are often multiple ways to reach the same goal, AWS delivers a different option to answer the same question: “How can I manage my resources in private subnets in a secure, encrypted, and auditable fashion.” This can also be solved by using Instance Connect with its newest addition: Instance Connect Endpoint</p>
<h3>4.1. What Is Instance Connect?</h3>
<p>The Instance Connect feature was introduced in 2019 and offers a solution to control SSH access to your instances using AWS Identity and Access Management (IAM) policies and audit connection requests with AWS CloudTrail events. In addition, you can leverage your existing SSH keys or further enhance your security posture by generating one-time use SSH keys each time an authorized user connects.</p>
<p>Instance Connect works with any SSH client, but you can also easily connect to your instances from the EC2 Console.</p>
<p>The question: “How can I manage my resources in private subnets in a secure, encrypted, and auditable fashion?” is not solved by this approach because:</p>
<ul>
<li>The machine still needs a public IP address.</li>
<li>The connection logs cannot be stored in S3 or CloudWatch.</li>
</ul>
<p>A few months ago, AWS introduced a new Instance Connect Endpoint feature that solves the first drawback listed above.</p>
<h3>4.2. Instance Connect Endpoint</h3>
<p>With the Endpoint for Instance Connect (EIC) Service, you no longer need a public IP address on your resource or any agent to connect to your resources. The Instance Connect Endpoint Service works in three ways:</p>
<ul>
<li>AWS Management Console</li>
<li>AWS Command Line Interface (AWS CLI)</li>
<li>SSH Clients like PuTTY or OpenSSH</li>
</ul>
<h4>4.2.1. Instance Connect Endpoint Features</h4>
<p>The EIC Endpoint Service is an identity-aware TCP proxy. As described above, it has two modes:</p>
<ul>
<li>AWS CLI | SSH CLients</li>
<li>AWS Console</li>
</ul>
<p>The AWS CLI client is used to create a secure WebSocket tunnel from your workstation to the endpoint, where authorization happens with your AWS Identity and Access Management (IAM) credentials. When the tunnel is established, point your preferred SSH client at your loopback address (127.0.0.1 or localhost) and connect as usual.</p>
<p>Second, the Console gives you secure and seamless access to resources inside your VPC. Authentication and authorization are evaluated via IAM before traffic reaches the VPC. The diagram below illustrates a user connecting to an AWS EIC.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20906" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding13.png" alt="" width="605" height="514" /></p>
<p>As shown above, the EIC Endpoints Service provides a high degree of flexibility.</p>
<ul>
<li>It doesn’t require your VPC to have direct Internet connectivity</li>
<li>No agent is needed on the resource(s) you wish to connect to</li>
<li>It preserves existing workflows by allowing your preferred client software to connect</li>
<li>IAM and Security Groups can be used to control access</li>
</ul>
<h4>4.2.2. Instance Connect Endpoint Security and Logging</h4>
<h5>IAM</h5>
<p>The beauty of this solution lies in the fact that access can be limited to what the user needs: EIC Endpoints Service follows the important security requirements in terms of the separation of privileges for the control plane and the data plane. An administrator with full EC2 IAM privileges can create and control EIC Endpoints (the control plane). However, the same administrator cannot use those endpoints without also having EC2 Instance Connect IAM privileges (the data plane). The DevOps Engineers who may need to use EIC Endpoint to tunnel into VPC resources do not require control-plane privileges to do so.</p>
<h5>CloudTrail</h5>
<p>Records of data plane connections include the IAM principal making the request, their source IP address, the requested destination IP address, and the destination port. An example of connecting to the instance from the console:</p>
<p>{<br />
&#8220;eventVersion&#8221;: &#8220;1.08&#8221;,<br />
&#8220;userIdentity&#8221;: {<br />
&#8220;type&#8221;: &#8220;FederatedUser&#8221;,<br />
&#8220;principalId&#8221;: &#8220;123456789:Example&#8221;,<br />
&#8220;arn&#8221;: &#8220;arn:aws:sts::123456789:ExampleUser&#8221;,<br />
&#8220;accountId&#8221;: &#8220;123456789&#8221;,<br />
&#8220;accessKeyId&#8221;: &#8220;ExampleKey&#8221;,<br />
&#8220;sessionContext&#8221;: {<br />
&#8220;sessionIssuer&#8221;: {<br />
&#8220;type&#8221;: &#8220;IAMExample&#8221;,<br />
&#8220;principalId&#8221;: &#8220;ExampleID&#8221;,<br />
&#8220;arn&#8221;: &#8220;arn:aws:iam::123456789:user/exampleuser&#8221;,<br />
&#8220;accountId&#8221;: &#8220;123456789&#8221;,<br />
&#8220;userName&#8221;: &#8220;exampleuser&#8221;<br />
},<br />
&#8220;webIdFederationData&#8221;: {},<br />
&#8220;attributes&#8221;: {<br />
&#8220;creationDate&#8221;: &#8220;2023-07-24T12:24:55Z&#8221;,<br />
&#8220;mfaAuthenticated&#8221;: &#8220;true&#8221;<br />
}<br />
}<br />
},<br />
&#8220;eventTime&#8221;: &#8220;2023-07-24T13:19:22Z&#8221;,<br />
&#8220;eventSource&#8221;: &#8220;ec2-instance-connect.amazonaws.com&#8221;,<br />
&#8220;eventName&#8221;: &#8220;SendSSHPublicKey&#8221;,<br />
&#8220;awsRegion&#8221;: &#8220;eu-west-1&#8221;,<br />
&#8220;sourceIPAddress&#8221;: &#8220;123456789&#8221;,<br />
&#8220;userAgent&#8221;: &#8220;Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0&#8221;,<br />
&#8220;requestParameters&#8221;: {<br />
&#8220;instanceId&#8221;: &#8220;i-123456789&#8221;,<br />
&#8220;instanceOSUser&#8221;: &#8220;ec2-user&#8221;,<br />
&#8220;sSHPublicKey&#8221;: &#8220;ssh-ed25519Example\n&#8221;<br />
},<br />
&#8220;responseElements&#8221;: {<br />
&#8220;requestId&#8221;: &#8220;b2a9eeae-7189-4b6c-ac8a-a41e56ea1a42&#8221;,<br />
&#8220;success&#8221;: true<br />
},<br />
&#8220;requestID&#8221;: &#8220;b2a9eeae-7189-4b6c-ac8a-a41e56ea1a42&#8221;,<br />
&#8220;eventID&#8221;: &#8220;161427f7-8f1e-459a-83f1-2f54aca879ca&#8221;,<br />
&#8220;readOnly&#8221;: false,<br />
&#8220;eventType&#8221;: &#8220;AwsApiCall&#8221;,<br />
&#8220;managementEvent&#8221;: true,<br />
&#8220;recipientAccountId&#8221;: &#8220;123456789&#8221;,<br />
&#8220;eventCategory&#8221;: &#8220;Management&#8221;,<br />
&#8220;tlsDetails&#8221;: {<br />
&#8220;tlsVersion&#8221;: &#8220;TLSv1.3&#8221;,<br />
&#8220;cipherSuite&#8221;: &#8220;TLS_AES_128_GCM_SHA256&#8221;,<br />
&#8220;clientProvidedHostHeader&#8221;: &#8220;ec2-instance-connect.eu-west-1.amazonaws.com&#8221;<br />
},<br />
&#8220;sessionCredentialFromConsole&#8221;: &#8220;true&#8221;<br />
}</p>
<h3>4.3. Connection Examples</h3>
<h4>4.3.1. Via the Console</h4>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20908" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding14.png" alt="" width="756" height="548" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20909" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding15.png" alt="" width="756" height="246" /></p>
<p>This gives you:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20910" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding16.png" alt="" width="756" height="462" /></p>
<p>As you can see, the console does not login via SSM-user but via EC2-user and with a private IP.</p>
<h4>4.3.2 Via the AWS CLI</h4>
<p>To connect via the AWS CLI, make sure that you have the latest AWS CLI installed. Then you can use the new ec2-instance-connect ssh command from the AWS CLI. With this new command, AWS generates ephemeral keys for you to connect to your Instance.</p>
<p>Note that this command requires using the OpenSSH client and the latest version of the AWS CLI. You need IAM permissions, as detailed here, to use this command and connect. You can find an example below:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20911" src="https://cloudar.be/wp-content/uploads/2023/09/InstanceConnect.png" alt="" width="605" height="332" /></p>
<h4>4.3.3 Via SSH Clients</h4>
<p>Create your own private key:</p>
<p>ssh-keygen -t rsa -f mynew_key</p>
<p>Use the following AWS CLI command to authorize the user and push the public key to the Instance using the send-ssh-public-key command. To support this, you need the latest version of the AWS CLI.</p>
<p>aws ec2-instance-connect send-ssh-public-key &#8211;region eu-west-1 &#8211;instance-id i-0123456789example &#8211;availability-zone eu-west-1a &#8211;instance-os-user ec2-user &#8211;ssh-public-key file://mynew_key.pub</p>
<p>This gives back:</p>
<p>{<br />
&#8220;RequestId&#8221;: &#8220;9c4bf3df-799d-4f40-9e2d-cbc3ed3bbe08&#8221;,<br />
&#8220;Success&#8221;: true<br />
}</p>
<p>After authentication, the public key is made available to the Instance through the Instance metadata for 60 seconds. During this time, connect to the Instance using the associated private key:</p>
<p>ssh ec2-user@[INSTANCE] \<br />
-i [SSH-KEY] \<br />
-o ProxyCommand=&#8217;aws ec2-instance-connect open-tunnel \<br />
&#8211;instance-id %h&#8217;</p>
<p>This gives back:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20927" src="https://cloudar.be/wp-content/uploads/2023/09/Afbeelding17.png" alt="" width="756" height="247" /></p>
<p>With this method, plain SSH clients can still be used via short-lived keys.</p>
<h4>4.3.4 Connecting to the Windows Machines</h4>
<p>How to connect to Windows machines is similar:</p>
<p>aws ec2-instance-connect open-tunnel \<br />
&#8211;instance-id i-0123456789example \<br />
&#8211;remote-port 3389 \<br />
&#8211;local-port any-port</p>
<p>In your RDP Client, set it up like this, mark that the &#8211;local-port is set to 5555</p>
<p>&nbsp;</p>
<h3>4.4 To Sum Up Instance Connect</h3>
<p>As shown in the blog post above, Instance Connect allows you to connect to your private resources privately and securely without needing long-lived SSH keys and/or bastion hosts.<br />
The drawback compared to AWS Sessions Manager is that you cannot log session logs towards Amazon S3 or Amazon CloudWatch. The benefit is that you don’t need to install custom agents on your machines, which makes this solution the preferred solution for older Instances and appliances running in your AWS environment.</p>
<h2>5. Final Conclusion</h2>
<p>AWS provides various methods to connect to Instances, including SSH, RDP, AWS Systems Manager Session Manager, EC2 Instance Connect and Endpoint, bastion hosts, and VPN. The choice of method depends on the operating system, security requirements, network configuration, and personal preference. By leveraging these connection methods, you can securely access and manage your AWS Instances based on your specific use cases and requirements.</p>
<p>What questions do you have after reading this blog post? We would love to answer them!</p>
<p>The post <a href="https://cloudar.be/awsblog/managing-instances-in-private-subnets-with-session-manager-or-instance-connect/">Managing Instances in Private Subnets with Session Manager or Instance Connect</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Get it covered: 7 essential practices for AWS security</title>
		<link>https://cloudar.be/awsblog/get-it-covered-7-essential-practices-for-aws-security/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Fri, 14 Jul 2023 13:42:15 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=20704</guid>

					<description><![CDATA[<p>In today’s ever-changing threat landscape, cloud security cannot be emphasized enough. Although the AWS platform provides organizations with a dependable, scalable and cost-effective solution for storing and processing sensitive data, organizations must implement their own AWS security best practices as part of the shared responsibility model. Here are seven crucial practices that can help you [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/get-it-covered-7-essential-practices-for-aws-security/">Get it covered: 7 essential practices for AWS security</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>In today’s ever-changing threat landscape, cloud security cannot be emphasized enough. Although the AWS platform provides organizations with a dependable, scalable and cost-effective solution for storing and processing sensitive data, organizations must implement their own AWS security best practices as part of the shared responsibility model. Here are seven crucial practices that can help you secure your cloud infrastructure and mitigate the risk of security breaches:</strong></p>
<h2>#1 Develop a comprehensive strategy</h2>
<p>Before deploying your applications on AWS, it is essential to establish a well-defined cybersecurity strategy. This strategy should include conducting a risk assessment, performing threat modelling, and devising a mitigation plan. Identify potential risks and vulnerabilities specific to your cloud infrastructure and implement measures to address them. This will ensure compliance with industry standards and regulations while proactively preventing cyberattacks.</p>
<h2>#2 Become familiar with the AWS Well-Architected Framework</h2>
<p>AWS offers abundant resources to help organizations enhance their security posture. <a href="https://cloudar.be/services-solutions/aws-well-architected-review/">The AWS Well-Architected Framework</a> provides guidance for designing and operating secure and cost-effective systems in the cloud. The Framework encompasses five key pillars: operational excellence, security, reliability, performance efficiency, and cost optimization. Understanding and leveraging the Framework is key to safeguarding applications against potential cyberthreats.</p>
<h2>#3 Implement robust security controls</h2>
<p>Taking proactive measures to impose strong cloud security controls is crucial for organizations to secure their AWS cloud infrastructure effectively. As the responsibility falls on you to protect your cloud workloads, consider implementing security controls to minimize the risk of security breaches, including clearly defining user roles, conducting privilege audits, enforcing a strong password policy, and using multi-factor authentication (MFA). Consistent enforcement and adherence to these security controls throughout your organization are essential.</p>
<h2>#4 Ensure easy access to security policies</h2>
<p>Accessibility to your <a href="https://cloudar.be/category/security-compliance/">AWS security policies</a> is key to promoting a culture of security within your organization. These policies should encompass access control, network security, encryption, and incident response guidelines. Making policies accessible helps everyone in your organization understand the importance of security and act in accordance with your policies.</p>
<h2>#5 Safeguard data with encryption</h2>
<p>Encrypting your data prevents unauthorized access and ensures its confidentiality, even if intercepted or stolen. Encryption is often mandatory for regulatory compliance. AWS provides various encryption options, including server-side encryption, client-side encryption, and transit encryption. Familiarize yourself with these options and choose the appropriate method to secure your sensitive data within your cloud environment.</p>
<h2>#6 Back up data consistently</h2>
<p>Regular data backups ensure data integrity and availability. In the event of cyberattacks, hardware failures, or accidental deletions, having up-to-date backups provides peace of mind and enables data recovery. The frequency of backups should be based on the criticality and volatility of your data. Regulatory requirements and business needs will determine how long the data will be retained. AWS offers various backup options, such as Amazon EBS, Amazon S3, and AWS Backup. By leveraging these options, you can store your backups in multiple regions to ensure constant protection.</p>
<h2>#7 Stay up to date</h2>
<p>AWS regularly releases security patches, bug fixes, and updates to address vulnerabilities and counter new threats. Keeping your AWS systems up to date maintains the security of your environment and protects against potential attacks. Take advantage of AWS’s automatic update features, such as Amazon Inspector and AWS Systems Manager, to automate patching and ensure your systems are always current. Configure notifications to receive alerts about new updates, enabling prompt action to stay ahead of security risks.</p>
<p><strong>Want to optimally prepare your organization for cloud-related security threats? <a href="https://cloudar.be/contact">Get in touch with Cloudar</a>, an official Next Generation AWS Managed Service Provider Partner.</strong></p>
<p>The post <a href="https://cloudar.be/awsblog/get-it-covered-7-essential-practices-for-aws-security/">Get it covered: 7 essential practices for AWS security</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Unsurpassed: 6 reasons to run Microsoft Workloads on AWS</title>
		<link>https://cloudar.be/awsblog/unsurpassed-6-reasons-to-run-microsoft-workloads-on-aws/</link>
		
		<dc:creator><![CDATA[Patrick Daulie]]></dc:creator>
		<pubDate>Wed, 28 Jun 2023 08:54:41 +0000</pubDate>
				<category><![CDATA[AWS Blog]]></category>
		<category><![CDATA[Migration]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=20636</guid>

					<description><![CDATA[<p>No other cloud provider comes close to the amount of experience and capability AWS has for migrating and running Windows. Here are six reasons why AWS stands out as the premier cloud infrastructure for Windows workloads: #1 The broadest &#38; deepest AWS boasts the broadest and deepest capabilities for Windows of any cloud provider, with [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/unsurpassed-6-reasons-to-run-microsoft-workloads-on-aws/">Unsurpassed: 6 reasons to run Microsoft Workloads on AWS</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>No other cloud provider comes close to the amount of experience and capability AWS has for migrating and running Windows. Here are six reasons why AWS stands out as the premier cloud infrastructure for Windows workloads:</strong></p>
<h2>
<b data-stringify-type="bold">#1 The broadest &amp; deepest</b></h2>
<p>AWS boasts the broadest and deepest capabilities for Windows of any cloud provider, with nearly twice as many Windows Server Instances compared to its closest competitor. It also offers the widest range of cloud services tailored for Microsoft technologies, seamlessly integrated within a cohesive ecosystem. This includes an array of compute, database, application, and deployment services, along with a comprehensive set of management tools, providing a solution for all your business requirements.</p>
<h2>
<b data-stringify-type="bold">#2 Greater reliability &amp; performance</b></h2>
<p>With 77 Availability Zones (AZ) spread across 24 regions, the AWS Cloud guarantees that your workloads remain operational and accessible precisely when you need them. Customers can reduce their unplanned downtime by a whopping 98% by moving their Windows workloads to AWS. AWS delivers double the performance and achieved a 62% reduction in costs in comparison with the next largest cloud provider for a SQL Server workload on an EC2 R5b.8xlarge instance, according to Principled Technologies.</p>
<h2>
<b data-stringify-type="bold">#3 Superior security</b></h2>
<p>AWS offers a staggering 230 security, compliance, and governance services and features, five times more than its closest cloud provider counterpart. AWS also provides encryption across over a hundred distinct AWS services. By leveraging these comprehensive security offerings, customers can effectively safeguard their environments. The AWS Nitro System in EC2 instances offloads virtualization functions to dedicated hardware and software, effectively reducing the potential attack surface and ensuring minimal exposure to vulnerabilities.</p>
<h2>
<b data-stringify-type="bold">#4 Cost optimization</b></h2>
<p>By leveraging AWS for Windows workloads, customers benefit from accelerated growth, increased operational efficiency, and substantial long-term cost savings. According to IDC, customers can reduce their five-year cost of operations by 56% and achieve a 37% reduction in infrastructure costs. This translates to an impressive 442% return on investment (ROI) over a three-year period. Unique pricing models such as Savings Plans offer savings of up to 72% on Amazon EC2 instances, while Amazon EC2 Spot instances enable cost reductions of up to 90% for fault-tolerant workloads.</p>
<h2>
<b data-stringify-type="bold">#5 Smooth migration</b></h2>
<p>AWS has facilitated the seamless migration of millions of enterprises worldwide, including renowned names like Sysco, Hess, Sony DADC, Ancestry, and Expedia. With the time-tested AWS Migration Acceleration Program (MAP) methodology and the extensive expertise offered by AWS partners, customers are able to evaluate, optimize, and seamlessly shift their Windows and SQL Server workloads to AWS with minimal downtime to applications.</p>
<h2>
<b data-stringify-type="bold">#6 Flexible licensing</b></h2>
<p>AWS provides the broadest range of choices in the cloud for utilizing both new and existing Microsoft software licenses. With the purchase of license-included instances in Amazon Elastic Compute Cloud (Amazon EC2) or Amazon Relational Database Service (Amazon RDS), you receive fully compliant SQL Server licenses directly from AWS. You also have the flexibility to bring your existing licenses to AWS using options such as Amazon EC2 Dedicated Hosts, Amazon EC2 Dedicated Instances, or EC2 instances with default tenancy through Microsoft License Mobility via Software Assurance.</p>
<p><b data-stringify-type="bold">Ready to take the next step? Cloudar has unparalleled expertise</b> <b data-stringify-type="bold">in maximizing the potential of your <a href="https://cloudar.be/services-solutions/microsoft-workloads-on-aws/">Windows workloads on AWS</a>. </b><b data-stringify-type="bold"><a class="c-link" href="https://cloudar.be/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://cloudar.be/" data-sk="tooltip_parent">Get in touch</a></b><b data-stringify-type="bold"> to let us guide your way to higher performance and efficiency.</b></p>
<p>The post <a href="https://cloudar.be/awsblog/unsurpassed-6-reasons-to-run-microsoft-workloads-on-aws/">Unsurpassed: 6 reasons to run Microsoft Workloads on AWS</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
