Blog

Define custom session duration and end active sessions in IAM Identity Center
July 24, 2023
Managing access to accounts and applications requires a balance between maintaining simple, convenient access and managing the risks associated with active user sessions.
read more ❯

Creating Multi-Edge Data Architectures on AWS Wavelength and MongoDB
July 11, 2023
With the advent of high-speed 5G networks, enterprises have sought to deliver low-latency experiences in the Industrial Internet of Things IoT (IIoT), media and entertainment, automotive and more.
read more ❯

How do I configure ongoing replication from an external secret manager to AWS Secrets Manager?
June 24, 2023
Secrets Managers are great tools for securely storing confidential information and providing access to secret material to trusted individuals, applications, or systems. In different environments, you may have multiple Secrets Managers hosted by different vendors, which can increase the complexity of maintaining a consistent operating model for your entries.
read more ❯

Proactive insights from the Amazon DevOps Guru for RDS
May 31, 2023
Introducing the new Amazon DevOps guru for RDS functionality: Proactive Insights. DevOps Guru for RDS is a fully managed machine learning (ML)-based service that uses data collected by RDS Performance Insights to detect and alert customers to unusual behaviour in Amazon Aurora databases.
read more ❯

Select, create and track entity metrics for your applications
May 23, 2023
When you operate on a variable spend model in the cloud, business growth can translate into a variable bill that reflects the activity of your workloads in your environment. For some customers, a monthly increase in their AWS bill is a normal part of growth, but for a significant proportion it is an undesirable outcome. Therefore, it is important to use the right metrics to assess the economics of your infrastructure.
read more ❯

Reduce risk by implementing HttpOnly cookie authentication in Amazon API Gateway
April 24, 2023
Some web applications need to protect their authentication tokens or session IDs from cross-site scripting (XSS). It is an Open Web Application Security Project (OWASP) best practice for session management to store secret information in the cookie store of browsers with the HttpOnly attribute enabled.
read more ❯

News on the Microsoft Azure platform
April 24, 2023
By now, I think we will have a permanent place on our blog for publications that deal with what's new on the Azure platform. In this kind of short summary, I have selected the most important ones that have an impact on the projects that are being implemented at Hosters.
read more ❯

Tag workloads with AWS Config compatibility packages on AWS accounts
April 22, 2023
As cloud deployments become more complex, organizations struggle to manage and identify a growing set of resources. Tags provide companies with metadata about their resources, which they can use to identify resources for cost allocation, operations, or data security.
read more ❯

Create a CI/CD pipeline for .NET Lambda functions using AWS CDK pipelines
April 18, 2023
The AWS Cloud Development Kit (AWS CDK) is an open source development platform for defining cloud infrastructure in familiar programming languages and making it available via AWS CloudFormation.
read more ❯

Reversing technical debt with the Cloud
March 15, 2023
The following article covers best practices for managing and reversing technical debt through the prudent use and operation of cloud services.
read more ❯

Maximising price performance for big data workloads using Amazon EBS
February 15, 2023
Since the advent of big data more than a decade ago, Hadoop - an open-source platform for efficiently storing and processing large data sets - has played a key role in storing, analysing and reducing this data to provide value to businesses.
read more ❯

The Audit Guide for AWS PCI DSS Quick Start
February 14, 2023
The Audit Guide for AWS PCI DSS Quick Start is a post dedicated to anyone who has supported a Payment Card Industry Data Security Standard (PCI DSS) assessment as a Qualified Security Assessor (QSA) or as a technical team, probably spending a lot of time collecting and analysing evidence on PCI DSS requirements. In this post, we will describe how to use automation to reduce the effort of manual and repetitive evidence collection.
read more ❯