Member-only story
How to Secure your AWS Infrastructure
Configuring domain controller components so you don’t get hacked
The key advantages of cloud computing can be leveraged to support network services which have been traditionally located on-site. However, the benefits of the public cloud are not awarded without cost. This technology creates challenges to retain the required level of security; since the inclusion of cloud computing resources expands the enterprise bounds beyond the traditional definitions. Obtaining a reasonable level of security while implementing cloud-based directory information services is obtainable using existing technologies.
Moving the key computer infrastructure components to the cloud is an interesting proposition for many enterprise environments. Organizations may be enticed by the benefits of cloud computing and decide to migrate some services to this technology. Any radical change to a key component of an organization infrastructure will require a copious amount of research and analysis to satisfy stakeholders and concomitantly produce a successful transition. Therefore, it should be the goal of a cloud-based system implementation to minimize the attack surface to the best ability of the talent, and budget available.
The purpose of this guide is to aid system designers in this goal. This will be achieved…