Our Blogs

Get the latest in cloud infrastructure and cost optimization tactics that include step-by-step tutorials, how-to's, and industry updates and trends.

Get Well-Architected. 6 steps to removing inactive AWS keys now.

Reading Time: 5 minutes This blog kicks off a series in which we’ll address topics aligned with the AWS Well-Architected framework. If you were at AWS re:Invent, you probably heard AWS CTO Werner Vogels talk about well-architected cloud architecture. The AWS Well-Architected Framework provides a consistent approach and guidance to evaluate architectures and implement scalable designs, with a focus…

Read More
5 Reasons AWS Service Catalog is Sexy for DevOps and Cloud

Reading Time: < 1 minutes As organizations expand cloud adoption, it becomes critical to track assets, build workflows, and secure workloads in a defined and standardized manner. With AWS Service Catalog, you can launch pre-approved resources in AWS and incorporate existing ITSM and ITOM systems into your cloud workflows to eliminate silos and encourage DevOps best practices. At nClouds, we’re…

Read More
Can you add change management rigor to AWS and still go fast?

Reading Time: 3 minutes 5 ways to do change management at the speed of DevOps. Change is inevitable. In fact, if you’re practicing Agile and DevOps, of all the “continuous” states that you aspire to, there’s one you can count on, and that’s continuous change. Your team is continuously changing the infrastructure to deliver value to your customers in…

Read More
nClouds Earns Spot on CIOReview “20 Most Promising IT Service Management Solution Providers 2017”

Reading Time: < 1 minutes At nClouds, we’re thrilled to be included in the CIOReview annual listing of “20 companies that are at the forefront of providing IT Service Management solutions and impacting the marketplace.” The list is compiled by a panel of CEOs, CIOs, VCs, industry analysts, and the CIOReview editorial board. They were particularly excited about nOps and…

Read More
Top 10 things you can do today to enhance your AWS security

Reading Time: 5 minutes AWS brings agility to your business because you no longer have to wait for days for IT to spin up new servers. AWS enables organizations to quickly respond to business needs and rapidly add value to their clients. However, the speed doesn’t need to come at the expense of compromised security. Security is even more…

Read More
nOps Rules – Unused Resources

Reading Time: 2 minutes Unused resources accumulate in AWS as your workflows change and evolve. We do not tend to think about tidying up loose ends every time a workflow change occurs. For example, when you stop an EC2 instance, your automation might not delete EBS volumes. These volumes pile up and continue to incur cost. ELB has a…

Read More
nOps Rules – Root-user MFA

Reading Time: 2 minutes Enabling root user multi-factor authentication is great security practice. Some companies go as far as enabling physical MFA and locking it down in vault somewhere. nOps provide easy overview which one of your projects don’t have root MFA enabled. You can also receive real-time notifications when root logs in the console with our without MFA….

Read More
nOps Rules – Unrestricted SSH

Reading Time: 2 minutes Allowing SSH access to everyone is not a secure practice. Once you configure Unrestricted SSH Monitoring, any time someone opens port 22 to all, you’ll receive real-time notification. Unrestricted SSH Rule To enable the rule, simply go to the “Available nOps Rules” tab in nOps Rules and click on the “Unrestricted SSH” rule. Unrestricted SSH…

Read More
nOps Rules – Users without MFA

Reading Time: 2 minutes Multi-factor authentication is hard to enforce in AWS, yet is it recommended through AWS Security best practices to have it enabled for all users. nOps allows you receive real time alerts when any of your users login to AWS console without MFA across all your projects. Users Without MFA Rule To enable the rule, simply…

Read More