Security & Health

Make your entire infrastructure compliant with over 250 health checks and useful recommendations for cloud security, performance optimization and fault tolerance.

IAM roles for EC2 instances – A secure way to access...

Due to dynamic service infrastructure, complex configurations and various inter-dependencies of resources in cloud, it becomes quite important to put your security engine in...

AWS RDS Event Subscription: Keep a tab on Limits

Are you aware of the service limits imposed by AWS? You need to monitor all the resources that you are consuming and make sure...

Amazon Redshift cluster parameter groups should have SSL enabled

AWS users want to ensure that their infrastructure attains maximum security levels so that their daily operations do not get disrupted due to any...

AWS Redshift clusters configuration in a VPC for better cloud security

AWS EC2 VPC is the updated technology which provides many advantages to the users such as better access control, better networking infrastructure, and access to the latest node types for better throughput, performance, etc.

Secure Your Remote Desktop Protocol – Best practices & useful insights

Remote Desktop Protocol is developed by Microsoft and it is a proprietary protocol that provides a user with a graphical interface to connect another...

AWS KMS Key Rotation – How does it impact your cloud...

Cloud security refers to a set of policies, technologies or controls that are used to protect data, applications and associated infrastructure. Organizations want their...

Qualms About a Secure Cloud Management Platform? Centilytics Got You Covered

If you ever thought about security as one of the main pillars in terms of cloud management services, you got that one right. And...