Post PetyaWrap - How To Prevent Ransomware Attacks

Now that most have recovered from the hangover of the PetyaWrap ransomware attacks, it is Monday morning quarterback time. PetyaWrap was not a new ransomware with a zero day vulnerability, but rather a combination of three common vectors of attack that companies do not always take seriously. But securing your assets go beyond just your servers (aka EC2 instances); you also need to ensure your AWS Account is equally as secure.

 

AWS Best Practices: 3-Tier Infrastructure

The three-tier architecture pattern has been an established best practice for decades. By separating infrastructure into layers, each is inherently more secure and flexible. In the cloud, the same design principles apply. This article focuses on the core principles of the three-tier web application architecture pattern on AWS, including availability zones, load balancers, route tables, gateways, autoscaling groups, and databases.

AWS Best Practices: Tagging

Optimizing AWS Resource Management Through Tagging: A Comprehensive Guide


Tagging in AWS is a foundational practice that enhances visibility, cost control, and operational efficiency across your cloud environment. Whether managing a single application or a vast multi-account architecture, implementing a consistent tagging strategy enables better governance, automation, and cost accountability.


What Are AWS Tags?

New Stratus10 Blog!

Welcome to the new Stratus10 blog!

We decided to stop talking so much about how awesome the cloud is and start writing about it instead so we are starting a new blog.

What can you expect from our blog? For starters you can expect a downpour of information about the cloud. What it does, how it works, how it can help you get ahead of the competition, and all the cool things you can do along the way.