Hey! Have a good time!

Private blog about CyberSecurity in Clouds

AWS How to restrict access by IP

Hi there!
In today's post, I would like to show you how you can restrict access to your AWS Account. Very often companies use static IP addresses to access the Internet. So if you know that access to your AWS account has to happen from specific IP, why allow it from the whole Internet.

Continue reading...

Extra bullet against Phishing

In this short article, I want to share with you a very simple script that may save the day. I made a simple Lambda function that checks domains and sends a notification via SNS once a valid record was found (link). To simply deploy the…

Continue reading...

Log Management solutions in Clouds☁️(AWS Part1)

Hey there!👋

As a Security Engineer, I work with logs all the time and there is no need to explain how important it is to have the right logs from the right system at the right time. The volume of logs is dramatically increasing each year. And we have to handle that volume, we have to collect/store/correlate/precess them.

Continue reading...

Practice with AWS Access Analyzer

   Have you ever asked yourself who has access to my AWS resources? or who outside of my account has access? Honestly, the second one most important, because nobody wants to be a subject of news about a new data breach :). AWS made a tool for us to figure it out. It is called IAM Access analyzer. You can find it in the IAM Service. 

Continue reading...

Telegram Bot for Free (AWS/Serverless)

In this Post, I am going to explain to you how to create your own Telegram Bot based on Serverless technology called Lambda in AWS. It is not difficult at all, I will explain all the necessary steps for your success. I already use Lambda in production and by the Post want to show advantages of Serverless Technologies. Before we go, let's create a plan for what we will do:

  1. Create AWS account (out of the scope, I hope you have one)
  2. Register Telegram Bot
  3. Create a Lambda function
  4. Create API Gateway
  5. Combine them all and make work together
Continue reading...