As a DDoS testing and resilience consultancy, we routinely advise our clients to strengthen their architecture by using a reputable CDN like Cloudflare. After this weekβs Cloudflare outage, however, many organizations are understandably asking themselves a new question: Should we adopt a multi-CDN strategy instead of relying on a single provider? For the vast majority [β¦]
If you manage or administer a server, you need secure access to it. In Windows itβs RDP (Remote Desktop Protocol), usually configured with VPN or a jump host (jump server, jump box). On Linux it is the
I guess for this article I will be again hanged, burned at the stake and executed by firing squad at the same time, but fortunately comments are disabled, so all ugly words and curses will not affect me directly. Also, please, do not think this is a step-by-step guide to make your system secure. It is just a general overview of what to do, and
The goal of YATAS is to help you create a secure AWS environment without too much hassle. It won't check for all best practices but only for the ones that are important for you based on my experience. Please feel free to tell me if you find something that is not covered.
You can ignore results of checks by adding the following to your .yatas.yml file:
ignore: - id: "AWS_VPC_004" regex: true values: - "VPC Flow Logs are not enabled on vpc-.*" - id: "AWS_VPC_003" regex: false values: - "VPC has only one gateway on vpc-08ffec87e034a8953"
Exclude a test
You can exclude a test by adding the following to your .yatas.yml file:
plugins: - name: "aws" enabled: true description: "Check for AWS good practices" exclude: - AWS_S3_001
Specify which tests to run
To only run a specific test, add the following to your .yatas.yml file:
plugins: - name: "aws" enabled: true description: "Check for AWS good practices" include: - "AWS_VPC_003" - "AWS_VPC_004"
Get error logs
You can get the error logs by adding the following to your env variables:
export YATAS_LOG_LEVEL=debug
The available log levels are: debug, info, warn, error, fatal, panic and off by default
If you are a Whonix user this guide may be useful for you. Sometimes when I want to torify whole traffic from a virtual system I am using Whonix Gateway virtual machine. For people who havenβt use Whonix yet here is a short description with links:
The goal of YATAS is to help you create a secure AWS environment without too much hassle. It won't check for all best practices but only for the ones that are important for you based on my experience. Please feel free to tell me if you find something that is not covered.
You can ignore results of checks by adding the following to your .yatas.yml file:
ignore: - id: "AWS_VPC_004" regex: true values: - "VPC Flow Logs are not enabled on vpc-.*" - id: "AWS_VPC_003" regex: false values: - "VPC has only one gateway on vpc-08ffec87e034a8953"
Exclude a test
You can exclude a test by adding the following to your .yatas.yml file:
plugins: - name: "aws" enabled: true description: "Check for AWS good practices" exclude: - AWS_S3_001
Specify which tests to run
To only run a specific test, add the following to your .yatas.yml file:
plugins: - name: "aws" enabled: true description: "Check for AWS good practices" include: - "AWS_VPC_003" - "AWS_VPC_004"
Get error logs
You can get the error logs by adding the following to your env variables:
export YATAS_LOG_LEVEL=debug
The available log levels are: debug, info, warn, error, fatal, panic and off by default