Category Archives: AWS Cloud

Security Check Lists on AWS and Linux Servers.

By | April 13, 2019

We already have a blog on AWS Security Best Practices which is much in details and theoretical. You can refer that blog from here. I’m writing this blogs to to easily identify the contents in a form of checklists. This article will also cover server level security checklists as well. Security checklists has been categorized… Read More »

How to Setup OpenVPN Access Server on Ubuntu/CentOS.

By | December 16, 2018

Introduction OpenVPN is an open-source third-party software that uses virtual private network (VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and provides remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. OpenVPN uses the client-server connection to provide secure communication between the client and the internet.  The Server is directly… Read More »

AWS Security best Practices

By | May 23, 2018

AWS Security Best practices Security needs to be considered as one of the prime concern in every IT infrastructure. Its the primary role of the IT Administrator/Security specialist to secure their infrastructure in the best way he can. Everybody wants their organization IT infrastructure could be more secure. Most of the security professionals agree that… Read More »