Author Archives: anuj - Page 22
Why Service Accounts are a superior way to do Firewalls in GCP
Also read NACLS on AWS and GCP Equivalents The Problem Statement Configuring and managing IP-based firewall rules is a complex and manual process that can lead to unauthorized access if…
Redshift Security – Securing Redshift Data Warehouses on AWS ( and some parallels on GCP)
Securing Redshift Clusters on AWS Some common issues around securing redshift clusters are described in this post. 1. Redshift cluster - Is the cluster in a single account or across…
Why use a Customer Managed Key on AWS or GCP?
Why use a CMK on AWS ( a CMEK on GCP) at all, when the Cloud Provider managed keys will perform the same task? That's a question a lot of…
East to West Traffic Filtering using Palo Alto on GCP
Set up a 1 on 1 appointment with Anuj to assist with your cloud journey. First, you will need to decide whether egress, ingress or BOTH types of traffic are…
NACLs on AWS and Equivalent Firewall Rules on GCP
Also read AWS NACLs versus Security Groups and Service Accounts as an intelligent firewall option on GCP. The default NACLs on an AWS VPC allow ALL traffic (both inbound and…
Workload Identity versus Service Accounts in GCP
Also read - Using a service account across multiple projects Per Application Service Account As an application developer, you could generate individual IAM service accounts for each application, and then…
Using a service account across multiple projects
This content is password protected. To view it please enter your password below: Password:
Blocking off Public Access to Azure Storage Blobs
See also - A Reusable Hub spoke design on azure. A Reusable Hub Spoke design on GCP. Step 1 - Set up a private endpoint for azure storage blob service…
Shared VPC Best Practices, SAP Hana Example
Also see - granting the shared vpc admin role in gcp Overview - why a shared vpc isn't meant for shared prod and non-prod environments I wrote earlier about why…
Premium Tier Security Command Center GCP
Security Health Analytics should be your first stop for auditing the security posture of your GCP environment. In addition to several built in detectors, there are a handful of detectectors…