<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives | Cloudar</title>
	<atom:link href="https://cloudar.be/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudar.be/category/uncategorized/</link>
	<description>100% Focus On AWS // 100% Customer Obsession</description>
	<lastBuildDate>Mon, 26 Jan 2026 11:37:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>AWS Secrets Management: Protecting Your Digital Keys in the Cloud</title>
		<link>https://cloudar.be/awsblog/aws-secrets-management-protecting-your-digital-keys-in-the-cloud/</link>
		
		<dc:creator><![CDATA[Bart Coddens]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 09:53:12 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Security & Compliance]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22648</guid>

					<description><![CDATA[<p>Introduction Creating and managing secrets is perhaps as old as humans interacting with each other. Yet despite their critical importance, secrets remain one of the most vulnerable aspects of AWS infrastructure today. In our practice as Dev(Sec)Ops Engineers, we see these challenges daily accross our client environments. To start, the question needs to be asked: [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/aws-secrets-management-protecting-your-digital-keys-in-the-cloud/">AWS Secrets Management: Protecting Your Digital Keys in the Cloud</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduction</h2>
<p>Creating and managing secrets is perhaps as old as humans interacting with each other. Yet despite their critical importance, secrets remain one of the most vulnerable aspects of AWS infrastructure today. In our practice as Dev(Sec)Ops Engineers, we see these challenges daily accross our client environments.</p>
<p>To start, the question needs to be asked: “What exactly is a secret?”  In AWS and Cloud environments in general, a secret is anything used to access systems and/or data. These digital keys unlock potentially critical systems and must be protected from unauthorized access at all costs.</p>
<p>&nbsp;</p>
<p>As Dev(Sec)Ops Engineers working in AWS, you are responsible for managing an extensive arry of secrets:</p>
<p>&nbsp;</p>
<ul>
<li>RDS database usernames and passwords</li>
<li>API keys for AWS services and third-party integrations</li>
<li>CodeDeploy and deployment system credentials</li>
<li>KMS encryption keys for data protection</li>
<li>Private keys for SSL/TLS certificates and secure communications</li>
<li>EC2 SSH keys and key pairs</li>
<li>IAM user credentials for developers, QA, and operations teams</li>
<li>Application service accounts and roles</li>
<li>Any username/password combinations</li>
<li>Sensitive configuration data that could aid attackers</li>
</ul>
<p>&nbsp;</p>
<p>The challenge is not just the volume … it&#8217;s the complexity of securing these secrets across multiple AWS accounts and other environments while maintaining operational efficiency.</p>
<p>&nbsp;</p>
<h2>The Hidden Dangers: How Secrets Get Compromised in AWS</h2>
<h3> The Configuration File Trap</h3>
<p>Storing secrets in configuration files is convenient but dangerous, especially in AWS environments where these files often end up in S3 buckets or EC2 instances. This risk was nicely illustrated in the RSA conference presentation &#8220;Red Team vs Blue Team on AWS&#8221; by Kolby Allen and Teri Radichel: <a href="https://www.youtube.com/watch?v=pnwNtlwFYus" target="_blank" rel="noopener">Link to video</a></p>
<p>In the video Kolby deployed AWS resources using sample code found easily on the Internet.  Teri, simulating an attacker, conducted a penetration test and discovered a Lambda function’s configuration file stored in a S3 bucket (for convenience) complete with REDS database credentials in plain tekst.</p>
<p>&nbsp;</p>
<p>If you must use configuration files in AWS:</p>
<ul>
<li>Maintain separate files for development, QA, and production AWS accounts</li>
<li>NEVER commit these files to source control systems (GitHub, GitLab, Bitbucket)</li>
<li>Use S3 bucket policies and encryption, but understand this is still suboptimal</li>
<li>Consider AWS Systems Manager Parameter Store as a minimum improvement</li>
</ul>
<p>&nbsp;</p>
<p>This vulnerability is so important that it’s formally recognized in the MITRE attack framework:  [CWE-200: Exposure of Sensitive Information] (<a href="https://cwe.mitre.org/data/definitions/200.html" target="_blank" rel="noopener">link</a>)</p>
<p>&nbsp;</p>
<h2>Public Source Control: A Goldmine for AWS Account Takeovers</h2>
<p>The most devastating secrets management failures occur when AWS credentials are committed to public repositories. The scale of this problem is staggering.</p>
<p>The people at TruffleHog constructed a live scanner for this:</p>
<p><a href="https://forager.trufflesecurity.com/explore">https://forager.trufflesecurity.com/explore</a></p>
<p>This scanner continuously detects AWS access keys, secrets keys and other credentials in public Github commits, revealing the massive and constant stream of exposed AWS and other secrets.</p>
<p>&nbsp;</p>
<p>This has a widespread impact: TruffleHog researchers discovered approximately 4,500 secrets among the top 1 million websites, many of which were AWS credentials, as detailed in their comprehensive analysis:</p>
<p><a href="https://trufflesecurity.com/blog/4500-of-the-top-1-million-websites-leaked-source-code-secrets">https://trufflesecurity.com/blog/4500-of-the-top-1-million-websites-leaked-source-code-secrets</a></p>
<p>&nbsp;</p>
<p>Leaking these secrets can have far reaching financial consequences:</p>
<p>&nbsp;</p>
<p>A Reddit user faced a 26.000 $ bill after IAM was compromised to execute crypto miners:</p>
<p><a href="https://www.reddit.com/r/aws/comments/17p3v1e/account_got_hacked_and_get_26000k_bill/">https://www.reddit.com/r/aws/comments/17p3v1e/account_got_hacked_and_get_26000k_bill/</a></p>
<p>&nbsp;</p>
<p>A Developper was billed 14.000 $ on AWS following similar exposure:</p>
<p><a href="https://dev.to/juanmanuelramallo/i-was-billed-for-14k-usd-on-amazon-web-services-17fn">https://dev.to/juanmanuelramallo/i-was-billed-for-14k-usd-on-amazon-web-services-17fn</a></p>
<p>&nbsp;</p>
<p>AWS responded on these massive bills and is now actively scanning GitHub respositories through their AWS Credentials Exposed program and automatically disables discovery IAM access keys, but the frequency of these incidents remains alarmingly high as shown by the Trufflehog data.</p>
<p>&nbsp;</p>
<h2>Internal Systems: The False Security Blanket in AWS</h2>
<p>Private repositories and internal systems create a dangerous illusion of security, even within AWS environments. The 2020 Twitter breach perfectly illustrates this vulnerability:</p>
<p>&nbsp;</p>
<p>Attackers breached the perimeter, accessed internal Slack channels where developers had stored AWS credentials and other secrets, and used these to compromise infrastructure in a widely publicized incident:</p>
<p><a href="https://www.zdnet.com/article/twitter-says-hackers-accessed-dms-for-36-users-in-last-weeks-hack">https://www.zdnet.com/article/twitter-says-hackers-accessed-dms-for-36-users-in-last-weeks-hack</a></p>
<p>&nbsp;</p>
<p>Secrets embedded in code even in fully private AWS services, proliferate across AWS services and do appear in:</p>
<ul>
<li>CloudWatch logs from Lambda functions and EC2 instances</li>
<li>S3 bucket access logs</li>
<li>CloudTrail event data</li>
<li>Application Load Balancer logs</li>
<li>Systems Manager Session Manager history</li>
</ul>
<p>As such they do create additional attack vectors within your AWS environment.</p>
<p>&nbsp;</p>
<h2>Runtime Exposure: Secrets in AWS Production Workloads</h2>
<p>Running AWS applications create numerous opportunities for secret exposure:</p>
<ul>
<li>Configuration files within EC2 instances or container images</li>
<li>Environment variables visible in ECS task definitions or Lambda configurations</li>
<li>Memory dumps from EC2 instances containing sensitive data</li>
<li>Application caches in ElastiCache storing credentials</li>
<li>CloudWatch logs revealing secrets in error messages</li>
<li>EC2 instance metadata (IMDSv1) exposing IAM credentials</li>
<li>Unencrypted S3 bucket metadata and tags</li>
<li>AWS CloudShell command history</li>
<li>Bash history on EC2 instances</li>
<li>Container image layers in ECR with embedded secrets</li>
</ul>
<p>This non-exhaustive list demonstrates how secrets can leak from multiple AWS vectors without proper handling.</p>
<p>&nbsp;</p>
<h2>What does AWS offer to fight this battle ? AWS Native Secrets Management</h2>
<h3>Adopt Just-in-Time Secret Retrieval with AWS Services</h3>
<p>Core Principle: Store secrets in AWS-native management systems and retrieve them only when needed.</p>
<p>Instead of embedding secrets in configuration files, implement this AWS-secure workflow:</p>
<ol>
<li>Store secrets in AWS Secrets Manager or Systems Manager Parameter Store</li>
<li>Retrieve secrets programmatically using AWS SDKs at runtime</li>
<li>Use IAM roles and policies for access control</li>
<li>Clear secrets from memory when no longer needed</li>
</ol>
<p>&nbsp;</p>
<h3>AWS Access Control: Implement least-privilege IAM principles</h3>
<ul>
<li>Developers cannot access production secrets via IAM policies</li>
<li>Applications use IAM roles to retrieve only their required secrets</li>
<li>Cross-account access is controlled via resource-based policies</li>
</ul>
<p>&nbsp;</p>
<h3>AWS-Native Secrets Management Solutions</h3>
<ul>
<li>AWS Systems Manager Parameter Store</li>
<li>AWS Secrets Manager (Recommended for Production)</li>
<li style="list-style-type: none;"></li>
</ul>
<p>&nbsp;</p>
<p>As an MSSP, we recommend AWS Secrets Manager as the gold standard for AWS environments.</p>
<p>&nbsp;</p>
<h3>Why Secrets Manager over Parameter Store?</h3>
<ul>
<li>Enhanced security controls with fine-grained IAM integration</li>
<li>Automatic secret rotation for RDS, DocumentDB, and Redshift</li>
<li>Cross-account access capabilities essential for multi-account AWS strategies</li>
<li>Comprehensive audit trails via CloudTrail integration</li>
<li>No CloudFormation exposure risks unlike Parameter Store</li>
<li>Encryption at rest using AWS KMS by default</li>
</ul>
<p>As such we recommend the AWS Secrets Manager for Production workloads, the Encrypted Parameter Store can be used as a configuration store to fetch certain parameters.</p>
<p>&nbsp;</p>
<p>How to use this in code ?</p>
<p>&nbsp;</p>
<h3>Python with boto3:</h3>
<p>&nbsp;</p>
<pre><code>
import boto3
import json

# Using IAM role-based authentication (recommended)
client = boto3.client(&#039;secretsmanager&#039;, region_name=&#039;us-east-1&#039;)

try:
    secret_response = client.get_secret_value(SecretId=&#039;prod/rds/mysql-credentials&#039;)
    secret_dict = json.loads(secret_response[&#039;SecretString&#039;])
    
    # Use the secret
    db_username = secret_dict[&#039;username&#039;]
    db_password = secret_dict[&#039;password&#039;]
    
except ClientError as e:
    # Handle AWS-specific errors
    if e.response[&#039;Error&#039;][&#039;Code&#039;] == &#039;DecryptionFailureException&#039;:
        # Secrets Manager can&#039;t decrypt the protected secret text using the provided KMS key
        raise e
    elif e.response[&#039;Error&#039;][&#039;Code&#039;] == &#039;InternalServiceErrorException&#039;:
        # An error occurred on the server side
        raise e
    elif e.response[&#039;Error&#039;][&#039;Code&#039;] == &#039;InvalidParameterException&#039;:
        # Invalid parameter value
        raise e
    elif e.response[&#039;Error&#039;][&#039;Code&#039;] == &#039;InvalidRequestException&#039;:
        # Parameter value is not valid for the current state of the resource
        raise e
    elif e.response[&#039;Error&#039;][&#039;Code&#039;] == &#039;ResourceNotFoundException&#039;:
        # Can&#039;t find the resource that you asked for
        raise e


</code></pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3>Via Infrastructure as Code:</h3>
<ul>
<li>Cloudformation:
<ul>
<li><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-secretsmanager-secret.html">https://docs.aws.amazon.com/AWSCloudFormation/latest/TemplateReference/aws-resource-secretsmanager-secret.html</a></li>
</ul>
</li>
<li>Terraform:
<ul>
<li><a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/secure-sensitive-data-secrets-manager-terraform/using-secrets-manager-and-terraform.html">https://docs.aws.amazon.com/prescriptive-guidance/latest/secure-sensitive-data-secrets-manager-terraform/using-secrets-manager-and-terraform.html</a></li>
</ul>
</li>
<li>AWS CDK:
<ul>
<li><a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/cdk.html">https://docs.aws.amazon.com/secretsmanager/latest/userguide/cdk.html</a></li>
</ul>
</li>
<li>Pulumi:
<ul>
<li><a href="https://www.pulumi.com/registry/packages/aws/api-docs/secretsmanager/secret/">https://www.pulumi.com/registry/packages/aws/api-docs/secretsmanager/secret/</a></li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<h2>AWS Key Management Service (KMS)</h2>
<p>AWS KMS provides dedicated encryption key management, solving the &#8220;where to store the encryption key&#8221; problem for AWS environments. KMS integrates seamlessly with Secrets Manager and most AWS services.</p>
<p>&nbsp;</p>
<p>KMS Best Practices for Secrets:</p>
<ul>
<li>Use customer-managed KMS keys for production secrets</li>
<li>Implement key rotation policies</li>
<li>Use separate KMS keys per environment/account</li>
<li>Leverage KMS key policies for fine-grained access control</li>
</ul>
<p>&nbsp;</p>
<h2>AWS Systems Manager Parameter Store</h2>
<p>While we recommend Secrets Manager for sensitive data, **Parameter Store** works well for:</p>
<ul>
<li>Non-sensitive configuration data</li>
<li>Cost-conscious environments (free tier available)</li>
<li>Simple use cases without rotation requirements</li>
</ul>
<p>&nbsp;</p>
<h2>Multi-Account AWS Strategies</h2>
<p>For AWS Organizations with multiple accounts (our recommended approach), consider:</p>
<h3>Cross-Account Secrets Access:</h3>
<p>&nbsp;</p>
<pre><code>
{
  &quot;Version&quot;: &quot;2012-10-17&quot;,
  &quot;Statement&quot;: [
    {
      &quot;Effect&quot;: &quot;Allow&quot;,
      &quot;Principal&quot;: {
        &quot;AWS&quot;: &quot;arn:aws:iam::PROD-ACCOUNT-ID:role/ApplicationRole&quot;
      },
      &quot;Action&quot;: &quot;secretsmanager:GetSecretValue&quot;,
      &quot;Resource&quot;: &quot;*&quot;,
      &quot;Condition&quot;: {
        &quot;StringEquals&quot;: {
          &quot;secretsmanager:ResourceTag/Environment&quot;: &quot;production&quot;
        }
      }
    }
  ]
}
</code></pre>
<p>&nbsp;</p>
<h3>Multi-Region Considerations:</h3>
<ul>
<li>Replicate critical secrets across AWS regions</li>
<li>Use AWS Secrets Manager automatic replication</li>
<li>Consider data residency requirements</li>
</ul>
<p>&nbsp;</p>
<h2>AWS Implementation Best Practices from Our MSSP Experience</h2>
<h3>Security Architecture Considerations</h3>
<ul>
<li>Design secure AWS deployment pipelines** using CodePipeline, CodeBuild, Github Actions with ci-cd plugins like trufflehog : <a href="https://undercodetesting.com/how-to-hunt-for-sensitive-credentials-using-trufflehog">https://undercodetesting.com/how-to-hunt-for-sensitive-credentials-using-trufflehog</a></li>
<li>Implement comprehensive IAM access management with least-privilege principles</li>
<li>Establish governance policies using AWS Config and AWS Organizations SCPs/RCPs</li>
<li>Plan for secret rotation using AWS Secrets Manager automation</li>
<li>Monitor and audit secret access via CloudTrail and CloudWatch</li>
</ul>
<p>&nbsp;</p>
<h3>Operational Excellence in AWS</h3>
<ul>
<li>Automate secret provisioning using AWS Lambda and CloudFormation/Terraform/…</li>
<li>Implement emergency access procedures via AWS SSO and break-glass roles</li>
<li>Establish incident response for compromised secrets using AWS Security Hub or other CSPM/CNAPP</li>
<li>Regular security assessments using AWS Inspector and third-party tools</li>
<li>Cost optimization by right-sizing Secrets Manager usage vs. Parameter Store</li>
</ul>
<p>&nbsp;</p>
<h3>AWS-Specific Monitoring and Alerting</h3>
<p>Set up CloudWatch alarms for:</p>
<ul>
<li>Unusual Secrets Manager API calls</li>
<li>Failed secret retrievals</li>
<li>Cross-account secret access</li>
<li>KMS key usage anomalies</li>
</ul>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>Effective AWS secrets management is not just about choosing the right AWS service it&#8217;s about implementing a comprehensive security strategy that leverages AWS-native capabilities while addressing the entire lifecycle of sensitive data. The examples and breaches discussed here represent real financial and reputational risks that AWS customers face daily.</p>
<p>&nbsp;</p>
<h3>Key AWS Takeaways:</h3>
<ol>
<li>Never store secrets in configuration files, S3 buckets, or source control</li>
<li>Use AWS Secrets Manager for production secrets management</li>
<li>Implement just-in-time secret retrieval with AWS SDKs</li>
<li>Apply least-privilege IAM policies and roles</li>
<li>Leverage AWS KMS for encryption key management</li>
<li>Plan for multi-account and multi-region secret strategies</li>
</ol>
<p>The post <a href="https://cloudar.be/awsblog/aws-secrets-management-protecting-your-digital-keys-in-the-cloud/">AWS Secrets Management: Protecting Your Digital Keys in the Cloud</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloudar Reaches a New Milestone with Dutch Expansion</title>
		<link>https://cloudar.be/awsblog/cloudar-reaches-a-new-milestone-with-dutch-expansion/</link>
		
		<dc:creator><![CDATA[Nele Claes]]></dc:creator>
		<pubDate>Thu, 06 Mar 2025 13:10:58 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=22550</guid>

					<description><![CDATA[<p>Cloudar Expands Beyond Belgium: New Office in Utrecht Marks Dutch Growth Cloudar, an AWS Premier Consulting Partner in Belgium, is expanding beyond its borders after more than a decade. A new location in Utrecht will facilitate further growth in the Netherlands. We discuss Cloudar’s plans with Steyn Huizinga. Steyn Huizinga, Managing Partner at Cloudar NL, [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/cloudar-reaches-a-new-milestone-with-dutch-expansion/">Cloudar Reaches a New Milestone with Dutch Expansion</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-pm-slice="1 1 []"><strong>Cloudar Expands Beyond Belgium: New Office in Utrecht Marks Dutch Growth</strong></p>
<p>Cloudar, an AWS Premier Consulting Partner in Belgium, is expanding beyond its borders after more than a decade. A new location in Utrecht will facilitate further growth in the Netherlands. We discuss Cloudar’s plans with <a href="https://www.linkedin.com/in/steyn/" target="_blank" rel="noopener">Steyn Huizinga</a>.</p>
<p>Steyn Huizinga, Managing Partner at Cloudar NL, is leading the company’s Dutch expansion efforts. With ten years of AWS expertise, he brings the necessary experience to develop this new market. Cloudar was founded in 2014 and has always had a strong focus on AWS, a defining characteristic that sets it apart from other cloud specialists in both Belgium and the Netherlands.</p>
<p>&nbsp;</p>
<p><strong>Smart in Belgium and the Netherlands</strong></p>
<p>While Cloudar has primarily focused on Belgian customers in the past, it has always operated beyond the border, Huizinga explains. “After a delay due to COVID, now is the right time to open a dedicated Dutch office, allowing us to fully concentrate on the Dutch market.” According to Huizinga, it is important that Cloudar is not just seen as “those smart guys from Belgium,” but rather as “those smart guys from Belgium <strong>and</strong> the Netherlands.” The Belgian team will continue focusing on its home market, while the Dutch team will be dedicated to local customers.</p>
<p>The growth ambitions for the Netherlands are significant. “We aim to attract around ten new colleagues by the end of 2025, with plans for even stronger growth in the second year to meet demand,” says Huizinga. That demand is particularly high in Azure-dominated Netherlands, he notes.</p>
<p>&nbsp;</p>
<p><strong>AWS Premier Consulting Partner</strong></p>
<p>Achieving AWS Premier Consulting Partner status is no small feat. With only a few hundred partners worldwide holding this title, Cloudar is part of an exclusive group. Maintaining this status requires complete dedication to AWS, with stringent certification requirements for a significant portion of the workforce. Cloudar successfully meets these requirements with a relatively compact team, allowing it to be mentioned alongside much larger market players.</p>
<p>Cloudar’s AWS expertise is demonstrated through six AWS Competencies and five Service Validations across various domains. Given the vastness of the AWS portfolio, excelling in all services is impossible. Instead, Cloudar specializes in five core areas: security, cloud-native development, containerization, FinOps, and AI technology.</p>
<p>A key part of Cloudar’s approach is balancing innovation with responsible cloud usage. Many organizations start enthusiastically with AWS but later face unexpectedly high costs or overlooked security requirements. Cloudar advocates a ‘job-zero’ approach, integrating security and FinOps from the outset to prevent unpleasant surprises down the line.</p>
<p>By focusing exclusively on AWS, Cloudar stays close to the source of innovation. The company gains early access to AWS roadmaps, allowing it to anticipate new developments. This position in the AWS ecosystem enables Cloudar to respond quickly to changes and advise customers on the most effective implementations. For example, a container workload can be deployed in seventeen different ways on AWS, and Cloudar helps determine the optimal approach for each specific case. However, AWS can still surprise everyone, so consultants must be well-versed in the existing offerings.</p>
<p>In 2024, Cloudar achieved the AWS Sovereign Cloud Competency, aligning with the growing need for cloud sovereignty. The company embraces the mantra “encrypt everything” to ensure maximum data security. Additionally, Cloudar leverages AWS to approach IoT data in a more human-centric way rather than solely relying on dashboards.</p>
<p>&nbsp;</p>
<p><strong>Different Customer Preferences</strong></p>
<p>Huizinga notes clear differences in cloud preferences among customer segments: “ISVs often prefer to run their IT on AWS, while enterprise customers typically adopt a multicloud approach.” In such cases, Cloudar collaborates with Azure-focused colleagues, ensuring that Cloudar’s expertise remains dedicated to the AWS portion of a customer’s cloud strategy.</p>
<p>Choosing between cloud providers can be complex and should always be based on a clear cloud strategy, Huizinga emphasizes. “Organizations need to determine why they use Cloud X or Y for specific situations.” This is particularly important when internal IT operations run on Azure, while customer-facing platforms such as websites or retail environments operate on AWS. “You don’t want data to be transferred unnecessarily between different clouds.”</p>
<p>&nbsp;</p>
<p><strong>Dutch Customers Already on Board</strong></p>
<p>For Cloudar, expanding into the Netherlands is a natural step in its growth journey. The company already serves several Dutch clients, including <a href="https://cloudar.be/case-studies/coop-e-commerce-website-infrastructure/" target="_blank" rel="noopener">Coop</a>, <a href="https://cloudar.be/case-studies/mediahuis-shared-news-platform/" target="_blank" rel="noopener">Mediahuis</a> (operating in both Belgium and the Netherlands), and <a href="https://cloudar.be/case-studies/rgf-staffing-fast-forward-to-the-cloud/" target="_blank" rel="noopener">RGF</a>, an HR service provider. “Our approach is focused on helping organizations leverage Amazon’s cutting-edge technologies for competitive advantage while maintaining the fundamental aspects of a solid cloud infrastructure,” says Huizinga.</p>
<p>Huizinga observes that many companies adopt a multicloud strategy, with Microsoft Azure commonly used for office applications. AWS is frequently the preferred choice for customer-facing platforms, portals, and digital initiatives. “Of course, this is the perspective we see from our AWS-focused standpoint,” he adds.</p>
<p>According to Huizinga, AWS’s ‘model freedom’ philosophy provides a key advantage, particularly in AI. “AWS aims to offer customers as many AI options as possible, giving organizations the flexibility to choose the best solution for their specific needs.”</p>
<p>&nbsp;</p>
<p>The post <a href="https://cloudar.be/awsblog/cloudar-reaches-a-new-milestone-with-dutch-expansion/">Cloudar Reaches a New Milestone with Dutch Expansion</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Employee in the Spotlight: Account Manager Raf Lenaerts</title>
		<link>https://cloudar.be/awsblog/employee-in-the-spotlight-account-manager-raf-lenaerts/</link>
		
		<dc:creator><![CDATA[Team Cloudar]]></dc:creator>
		<pubDate>Tue, 11 Apr 2023 09:37:36 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=20570</guid>

					<description><![CDATA[<p>Cloudar runs on its fantastic team! And our team members are the engine of our growth as a company. Today Raf Lenaerts is taking center stage to talk about his work in sales and business development, and how he helps businesses drive innovation and develop cloud solutions. Here’s his take on being part of the [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/employee-in-the-spotlight-account-manager-raf-lenaerts/">Employee in the Spotlight: Account Manager Raf Lenaerts</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Cloudar runs on its fantastic team! And our team members are the engine of our growth as a company. Today Raf Lenaerts is taking center stage to talk about his work in sales and business development, and how he helps businesses drive innovation and develop cloud solutions. Here’s his take on being part of the close-knit team at Cloudar:  </strong></p>
<p><b><span data-contrast="auto">What do you like about working for Cloudar?</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Cloudar&#8217;s management places great emphasis on personal development and the importance of respecting each individual&#8217;s unique identity. I am grateful to work for a company that values collaboration and innovation, and I look forward to seeing what the future holds for us.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">One of the reasons for our team&#8217;s success is our no-nonsense approach and get-things-done mentality, as well as our strong inter-team collaboration. Despite not possessing a technical background, I am in awe of the unbelievable level of technical expertise that exists within our team, which makes me feel privileged to be a part of it every day. If you were a fly on the wall in our workplace, you would witness all the intense and positive discussions aimed at answering particular questions or situations. Challenging each other keeps us sharp!</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="auto">What memory or anecdote will stick with you?</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">At some point in life, everyone may experience a life-changing event that turns their world upside down. The empathy and humanity demonstrated within Cloudar are truly exceptional and something that I will never ever forget.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="auto">What’s your most important work milestone so far?</span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Although this is an opportunity to recall a personal milestone, I deliberately choose not to do so. Looking back to roughly two years ago and reflecting on what we have achieved together is truly remarkable. It is the unity among our people that drives our fantastic organization&#8217;s success every single day. This has been an unparalleled opportunity, and I remain immensely grateful for it.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="auto">Want to be part of our dream team? Check out </span></b><a href="https://cloudar.be/careers/"><b><span data-contrast="none">job opportunities</span></b></a><b><span data-contrast="auto">! </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>The post <a href="https://cloudar.be/awsblog/employee-in-the-spotlight-account-manager-raf-lenaerts/">Employee in the Spotlight: Account Manager Raf Lenaerts</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Check it: Aligning with the AWS Well Architected Framework</title>
		<link>https://cloudar.be/awsblog/check-it-aligning-with-the-aws-well-architected-framework/</link>
		
		<dc:creator><![CDATA[Team Cloudar]]></dc:creator>
		<pubDate>Mon, 10 Oct 2022 14:16:38 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cloudar.be/?p=20439</guid>

					<description><![CDATA[<p>There are many pros to developing your IT infrastructure on AWS, including cost-effectiveness, security and reliability. But what works for one business, may not work for another. The AWS Well-Architected Framework provides a consistent approach to help cloud architects evaluate infrastructure and create a scalable design. Built on the six pillars of AWS, it helps [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/check-it-aligning-with-the-aws-well-architected-framework/">Check it: Aligning with the AWS Well Architected Framework</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>There are many pros to developing your IT infrastructure on AWS, including cost-effectiveness, security and reliability. But what works for one business, may not work for another. The AWS Well-Architected Framework provides a consistent approach to help cloud architects evaluate infrastructure and create a scalable design. Built on the six pillars of AWS, it helps businesses make the right decisions. Go down the checklist of these best practices to see how you align!</strong></p>
<h2><strong>#1 Operational Excellence</strong></h2>
<p>The operational excellence pillar focuses on running and monitoring systems. The goal is to continually improve processes and procedures for delivering business value. This involves automating changes, responding to events and defining standards to manage daily operations. The design principles for operational excellence in the cloud are:</p>
<ul>
<li><strong>Perform operations as code</strong><strong>:</strong> Define your entire workload as code and update it with code. By doing this you limit human error and enable consistent responses to events.</li>
<li><strong>Make small changes that are reversible</strong><strong>:</strong> Design workloads to allow components to be updated regularly. Make changes in small increments that can be reversed if they don’t help resolve issues.</li>
<li><strong>Refine operations frequently</strong><strong>:</strong> Keep looking for ways to improve operations procedures. Set up regular review moment to make sure procedures are effective and that the team is familiar with them.</li>
<li><strong>Anticipate failure</strong><strong>:</strong> Identify potential sources of failure. Test your failure scenario and validate your understanding of their impact. Test workload and team responses to simulated events.</li>
<li><strong>Learn </strong><strong>from all operational failures:</strong> Drive improvement by learning from all failures. Share what is learned across teams and the organization.</li>
</ul>
<h2><strong>#2 Security</strong></h2>
<p>The security pilar focuses on protecting information and systems using risk assessment and mitigation. This pillar includes confidentiality and integrity of data, managing user permissions, and establishing controls to detect security events. These design principles can help you strengthen your workload security:</p>
<ul>
<li><strong>Build a strong identity foundation</strong><strong>:</strong> Implement the principle of least privilege and enforce separation of duties with appropriate authorizations. Centralize identity management.</li>
<li><strong>Create traceability</strong><strong>:</strong> Monitor, alert and audit actions and changes to your environment in real time. Integrate log and metric collection to automatically investigate and take action.</li>
<li><strong>Automate security</strong><strong>:</strong> Create secure architectures that are defined and managed as code in version-controlled templates.</li>
<li><strong>Protect data in transit and at rest</strong><strong>:</strong> Classify your date into sensitivity levels and use appropriate mechanisms.</li>
<li><strong>Prepare for security events</strong><strong>:</strong> Prepare for incidents by having incident management aligned with your organizational requirements. Run incidence response simulations and use automated tools.</li>
<li><strong>Keep people away from data:</strong> Reduce or eliminate the need for direct access or manual processing of data.</li>
</ul>
<h2><strong>#3 Cost</strong><strong> optimization</strong></h2>
<p>Cost optimization has a major impact on your bottom line. The cost optimization pillar helps remove all practices that lead to unnecessary costs or underutilized resources. It helps better understand spending over time and control fund allocation, selecting resources of the right type and quantity, and scaling to meet business needs without overspending. These are the design principles for cost optimization:</p>
<ul>
<li><strong>Implement cloud financial management:</strong> Dedicate the necessary time and resources for building capability in this new domain of technology and usage management. Build capability through knowledge building, programs, resources, and processes to help you become a cost-efficient organization.</li>
<li><strong>Work out a consumption model</strong><strong>:</strong> Pay only for the computing resources you consume, and increase or decrease usage depending on business requirements.</li>
<li><strong>Measure overall cost efficiency</strong><strong>:</strong> Measure the business output of the workload and the costs associated with delivery. Use this data to understand the gains you make from increasing output, increasing functionality, and reducing cost.</li>
<li><strong>Don’t waste money </strong><strong>on undifferentiated heavy lifting:</strong> Let AWS do the heavy lifting of data center operations and the operational burden of managing operation systems and applications with managed services.</li>
<li><strong>Analyze </strong><strong>and attribute expenditure:</strong> With the help of the cloud, accurately identify the cost and usage of workloads. This allows for the transparent attribution of IT costs to revenue streams and workload owners and helps measure ROI.</li>
</ul>
<p>&nbsp;</p>
<h2><strong>#4 Reliability</strong></h2>
<p>The pillar of reliability includes practices that help workloads perform their intended functions and allow for faster recovery from failure. It covers distributed system design, recovery planning, and adapting to changing requirements. This helps companies avoid interruptions and improve availability.</p>
<p>These design principles can help you increase reliability:</p>
<ul>
<li><strong>Test your recovery procedures</strong><strong>:</strong> Test how your workload fail to validate your recovery procedures. Use automation to simulate failure scenarios and expose failure pathways.</li>
<li><strong>Increase aggregate system availability</strong><strong>:</strong> Scale horizontally, replacing one large resource with multiple small resources to reduce the impact of a single failure.</li>
<li><strong>Don’t guess capacity</strong><strong>:</strong> Avoid failure due to resource saturation by monitoring demand and workload utilization while automating resource levels.</li>
<li><strong>Manage change in automation:</strong> Make changes to your infrastructure using automation. Changes can then be tracked and reviewed.</li>
<li><strong>Automatically recover from failure:</strong> Trigger automation when a threshold is breached by monitoring for KPIs that measure business value. This allows for automatic notification and tracking of failures, and for automated recovery processes.</li>
</ul>
<h2><strong>#5 Performance efficiency</strong></h2>
<p>The performance efficiency pillar focuses on efficiently allocating IT and computing resources. It includes selecting resource types and sizes optimized for workload requirements, monitoring performance, and maintaining efficiency as business needs evolve. These design principles can help you achieve and maintain efficient workloads in the cloud:</p>
<ul>
<li><strong>Experiment often</strong><strong>:</strong> Quickly carry out comparative testing using different types of instances, storage, or configuration with virtual and automatable resources.</li>
<li><strong>Go global in a snap:</strong> Deploy your workload in multiple AWS Regions, allowing you to provide lower latency and a better experience for your customers at minimal cost.</li>
<li><strong>Use serverless architectures</strong><strong>:</strong> Remove the need to run and maintain physical servers, reducing operational burden and lowering transactional costs.</li>
<li><strong>Democratize advanced technologies:</strong> Make advanced technology implementation easier for your team by delegating complex tasks to your cloud vendor. Consider consuming the technology as a service.</li>
<li><strong>Consider mechanical sympathy:</strong> Use the technology approach that aligns best with your goals.</li>
</ul>
<h2><strong>#6 Sustainability </strong></h2>
<p>The sustainability pillar seeks to minimize the environmental impacts of running cloud workloads. It includes using a shared responsibility model for sustainability, understanding impact, and maximizing utilization to minimize required resources and reduce downstream impacts. These design principles help maximize sustainability and minimize impact:</p>
<ul>
<li><strong>Understand your impact:</strong> Measure the impact of your cloud workload and model the future impact of your workload. Include all sources of impact, compare the productive output with the total impact of your cloud workloads and use this data to establish</li>
<li><strong>Establish sustainability goals:</strong> For each cloud workload, establish long-term sustainability goals. Plan for growth, and architect your workloads so that growth results in reduced impact intensity measured against an appropriate unit, such as per user or per transaction.</li>
<li><strong>Maximize utilization:</strong> Right-size workloads and implement efficient design to ensure high utilization and maximize the energy efficiency of the underlying hardware</li>
<li><strong>Anticipate and adopt new, more efficient hardware and software offerings: </strong>Continually monitor and evaluate new, more efficient hardware and software offerings. Design for flexibility to allow for the rapid adoption of new efficient technologies.</li>
<li><strong>Use managed services:</strong> Maximize resource utilization by sharing services across a broad customer base. Use managed services that can help minimize your impact and adjust capacity to meet demand.</li>
<li><strong>Reduce the downstream impact of your cloud workloads:</strong> Reduce the amount of energy or resources required to use your services. Reduce or eliminate the need for customers to upgrade their devices to use your services. Test expected impact and test with customers to understand actual impact.</li>
</ul>
<p>Ready to check off that list to get the most business value while making a positive impact? It’s quite a task! Of course, it’s impossible to do it all. It’s about making the choices that best suit your business. To identify what that is exactly, you can hire an expert partner like Cloudar.</p>
<p><strong>Want to evaluate your company’s needs and design for the future? </strong><a href="https://cloudar.be/"><strong>Reach out</strong></a><strong> to us! </strong></p>
<p>The post <a href="https://cloudar.be/awsblog/check-it-aligning-with-the-aws-well-architected-framework/">Check it: Aligning with the AWS Well Architected Framework</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
