SOC 2 – What you need to know
By Kumar Gubbala | | DevOps Methodology
Summary: Every organization is concerned about information and data security. This includes those who outsource key activities to third parties (such as SaaS, and cloud ...
Read More
Infrastructure as Code –
What it is and How to use it
By Santosh Peddada | | DevOps Methodology
Summary : In the previous blogs in this series, I have discussed the significance of building a well-architected cloud environment, and how to manage the ...
Read More Achieve Security and Compliance with AWS Managed Security Services
By Rajesh Govada | | DevOps Methodology
Summary (TL: DR): Maintaining the security of your cloud environment is a 24/7 job that requires complete knowledge of how the cloud environment works, industry-standard ...
Read More Automated Security Centralization with AWS Control Tower
By Santosh Peddada | | DevOps Methodology
Summary: In Part 1, I explained how organizations can use the AWS Well-Architected Management & Governance Lens to build an agile, reliable, scalable, and secure ...
Read More How to Build a Well-Architected AWS Cloud Environment
By Santosh Peddada | | DevOps Methodology
Summary: Support your business applications and workloads with a well-architected cloud environment. Using the Management and Governance Lens, the AWS Well-Architected Review can help you ...
Read More