Cloud security is a critical concern for organizations that rely on cloud-based infrastructure and services to store, process, and transmit sensitive data. One key aspect of maintaining effective cloud security is regularly conducting security audits to identify and address potential vulnerabilities and risks.
6 min read
Did you know your Hava account supports MFA. Are you using it? MFA provides an optional layer of account log in security, but you probably already know that. In addition to your user name and password, you will be required to enter a one time code generated by a supported TOTP authentication application like Google Authenticator or Authy.
12 min read
AWS cloud architecture can get complex fast. Once you rotate through a few engineers or external consultants how confident are you that someone within your organisation knows exactly what you have running in your cloud accounts and are those resources actually being used.
Having up to date diagrams can be invaluable when you want to know how your networks hang together or need to explain to stakeholders what you have running and why.
The problem with creating and maintaining network diagrams manually is finding the time to do it in the first place, which is never anyone's priority and then finding the time to update the diagrams when things change (which they invariably do)
Topics: aws cloud Documentation security visualization diagrams
7 min read
When you are building cloud based applications and networks on AWS, there are many compelling reasons why you would want to accurately diagram and document your AWS infrastructure. Knowing exactly what is running based on the actual resources configured in your AWS environments is probably the number one reason to use an automated AWS infrastructure diagram generator over manually drawing diagrams yourself using a drag and drop process.
Topics: aws cloud Documentation security visualization vpc diagrams
8 min read
AWS security hub is a cloud security posture service that automates security checks and brings security alerts into a central location. The service performs best practice validation against your security settings, aggregates alerts and automates remediation of non compliant security settings.
3 min read
As part of our ongoing quest to help you understand what your cloud infrastructure and security posture looks like through easy to understand diagrams and visualisations, several enhancements to the current security view diagrams have been released that deliver even more clarity to potentially complex visualisations.