by Stephen Kuenzli | Feb 8, 2019 | AWS, Security, Strategy, Systems
I used Wardley mapping this morning to explore ideas I have for improving the development and review of AWS Identity and Access Management (IAM) policy changes. I’d like to share the internals of that mapping process with you to give you an illustrated example....
by Stephen Kuenzli | Feb 1, 2019 | Security, Systems
I’d like to recap why I’ve been discussing the nature of systems, isolation, and enterprise-level controls. Going Fast, Safely (Photo by Marc-Olivier Jodoin on Unsplash) It’s because I want you to: Go Fast, Safely I hope you recognize that the... by Stephen Kuenzli | Jan 31, 2019 | AWS, Cloud, Security
Let’s say you’re excited about using Service Control Policy to govern what goes on in your organization’s AWS accounts and improve compliance, but you don’t want to break the world when you roll it out. How do you do that? Start by identifying...
by Stephen Kuenzli | Jan 30, 2019 | AWS, Cloud, Security
Let’s examine how AWS Organizations helps you manage and improve some aspects of Enterprise-wide security and compliance. This discussion builds on the previous post detailing how AWS Organizations help you manage many AWS accounts and their costs. AWS...
by Stephen Kuenzli | Jan 25, 2019 | AWS, Cloud, Security
Previously, I answered ‘How many AWS accounts do I need?’ with: Create however many accounts your organization needs to establish safe security and fault boundaries that enable your organization’s primary use cases and expected level of team/application...