by Stephen Kuenzli | Feb 5, 2020 | AWS, Cloud, DevOps, Risk, Security, Systems
Cloud deployments often use tagging to describe the context of a compute or resource such as a who owns or what application a virtual machine or object storage bucket belongs to. However, the common resource tagging models in use don’t describe the context... by Stephen Kuenzli | Jan 21, 2020 | AWS, Cloud, Security
Operating applications involving more than a few components without explicitly modeled contextual clues is difficult for humans and might be impossible for tools. This is especially true when people are a couple steps removed such as is often the case when analyzing... by Stephen Kuenzli | Jan 15, 2020 | AWS, Cloud, DevOps, Security
I’m researching how engineers assess the security posture of their Cloud deployments and evaluate risk to those deployments so they can improve it. Reading Time: 10 minutes The research starts with these questions: What’s the hardest part about assessing...
by Stephen Kuenzli | Jan 13, 2020 | AWS, Cloud, Security
I’m researching how engineers assess the security posture of their Cloud deployments and evaluate risk to those deployments so they can improve understand and improve the Cloud deployment’s risk position. I identified, evaluated, and used the top free...
by Stephen Kuenzli | Jan 8, 2020 | AWS, Cloud, DevOps, Infrastructure As Code, Strategy
When I architected my SaaS’ deployment platform and delivery pipeline, I specifically sought to: maximize Aspects of a High Performance Software Delivery Processminimize components and platforms and offload as much undifferentiated, heavy lifting to focus my...
by Stephen Kuenzli | Dec 18, 2019 | AWS, Cloud, Security
The proper way to provide identities to applications on Cloud and container platforms is for the compute platform to provide that identity to the application instance . I call this the Cloud native application identity. Once the application has received its identity...