Skip to content

Articles tagged with Management & Governance

Enable, provision, and operate your environment for both business agility and governance control

Content language: English

Filter articles
Select tags to filter
Sort by
Sort by most recent

Browse through articles or filter your results using the tools displayed.

20 results
AWS Control Tower blocks direct modifications to the log archive bucket policy to protect audit logs. While you can bypass this using the AWSControlTowerExecution role, this risks drift detection, pol...
This framework provides a structured approach for migrating analytics workloads from EMR on EC2 to EMR Serverless in enterprise environments. It guides organizations through the complete migration lif...
This article explains how to use AWS Managed Services (AMS) to address security and compliancy findings from Cloud Security and Compliance Automation Platform Ecosystem (CloudSCAPE) assessments.
This article provides a strategic framework for consolidating your multiple organizations in AWS Organizations. It also outlines how AWS Enterprise Support and Technical Account Managers (TAMs) can gu...
Improving Health maturity improves your security and resilience posture by proactively helping your teams respond to changes that could otherwise lead to service disruptions, security vulnerabilities,...
I want to stop or terminate EC2 instances that don't have a required application installed (i.e. antivirus)
AWS
Tyler_PEXPERT
published 8 months ago0 votes1.1K views
Guide on integrating AWS Backup into your Control Tower Well-Architected Landing Zone to leverage multi-account best practices
Use label-based active series limits to manage active series volume across different producers such as applications, services or teams that share an Amazon Managed Service for Prometheus workspace
This article provides a guide on implementing Dynamic Data Masking (DDM) in conjunction with Amazon Redshift Data Sharing.
Organizations managing multiple AWS resources struggle to gain clear visibility into their backup operations despite AWS Backup's centralized management capabilities. This article demonstrates how to ...
Unrestricted SSH access to EC2 instances can create significant security vulnerabilities, exposing your infrastructure to potential attacks. This article provides a method to identify instances at ris...
  • 1
  • 2
  • Page size
    12 / page