Member-only story

How to Secure your AWS Infrastructure

Configuring domain controller components so you don’t get hacked

Ahad Sheriff
7 min readApr 18, 2019

The key advantages of cloud computing can be leveraged to support network services which have been traditionally located on-site. However, the benefits of the public cloud are not awarded without cost. This technology creates challenges to retain the required level of security; since the inclusion of cloud computing resources expands the enterprise bounds beyond the traditional definitions. Obtaining a reasonable level of security while implementing cloud-based directory information services is obtainable using existing technologies.

Moving the key computer infrastructure components to the cloud is an interesting proposition for many enterprise environments. Organizations may be enticed by the benefits of cloud computing and decide to migrate some services to this technology. Any radical change to a key component of an organization infrastructure will require a copious amount of research and analysis to satisfy stakeholders and concomitantly produce a successful transition. Therefore, it should be the goal of a cloud-based system implementation to minimize the attack surface to the best ability of the talent, and budget available.

The purpose of this guide is to aid system designers in this goal. This will be achieved…

--

--

Ahad Sheriff
Ahad Sheriff

Written by Ahad Sheriff

writing about life, culture, and technology.

No responses yet