shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

252
active users

#vpc

0 posts0 participants0 posts today
Teri Radichel<p>Some Interesting IP Address and VPC Announcements from AWS<br>~~<br>How are you currently managing your IP ranges and ASNs?<br>~~<br><a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> <a href="https://infosec.exchange/tags/IP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IP</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> </p><p><a href="https://medium.com/cloud-security/some-interesting-ip-address-and-vpc-announcements-from-aws-7566beb56179" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/some</span><span class="invisible">-interesting-ip-address-and-vpc-announcements-from-aws-7566beb56179</span></a></p>
Lewis Westbury 💛💙🌱<p>Working in <a href="https://mastodon.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>, you may find you need to move your <a href="https://mastodon.social/tags/lambdas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lambdas</span></a> out of the default <a href="https://mastodon.social/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> so they can talk to other services, eg. RDS. Granting <a href="https://mastodon.social/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> access to lambdas in the non-default VPC isn't trivial...</p><p>💡 Here's a <a href="https://mastodon.social/tags/CloudFormation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudFormation</span></a> gist with a working solution...</p><p>➡️ <a href="https://gist.github.com/instantiator/fc433a98bb6a58234602d67a69b3cda7" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/instantiator/f</span><span class="invisible">c433a98bb6a58234602d67a69b3cda7</span></a></p><p><a href="https://mastodon.social/tags/CF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CF</span></a> <a href="https://mastodon.social/tags/SAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAM</span></a> <a href="https://mastodon.social/tags/serverless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>serverless</span></a> <a href="https://mastodon.social/tags/InternetGateway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetGateway</span></a> <a href="https://mastodon.social/tags/NAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAT</span></a> <a href="https://mastodon.social/tags/NATGateway" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NATGateway</span></a></p>
Teri Radichel<p>Troubleshooting <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> <a href="https://infosec.exchange/tags/Endpoints" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Endpoints</span></a><br>~~<br>ACM.318 When you cannot access AWS Services or your response time slows down after deploying VPC endpoints and how to fix it<br>~~<br>Not sure this is how it’s supposed to work. 🤔 But this fixes it.</p><p><a href="https://medium.com/cloud-security/troubleshooting-vpc-endpoints-abf4cf05f1ef" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/trou</span><span class="invisible">bleshooting-vpc-endpoints-abf4cf05f1ef</span></a></p>
Teri Radichel<p>Cannot Restrict Lambda Actions Based on Private IP Addresses in a Service Control Policy</p><p>~~<br>ACM.313 <a href="https://infosec.exchange/tags/IPAddress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPAddress</span></a> and <a href="https://infosec.exchange/tags/NotIPAddress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NotIPAddress</span></a> conditions don’t work for Lambda on Private IP addresses in an <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/SCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SCP</span></a> when using a <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> Endpoint<br>~~</p><p><a href="https://medium.com/cloud-security/aws-ip-conditions-in-an-scp-not-working-with-private-ip-ranges-and-lambda-vpc-endpoint-22ff7a7647ca" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/aws-</span><span class="invisible">ip-conditions-in-an-scp-not-working-with-private-ip-ranges-and-lambda-vpc-endpoint-22ff7a7647ca</span></a></p>
Teri Radichel<p>Restricting the Ability to Invoke a Lambda Function to a Private Network<br>~~<br>ACM.311 When configuring a VPC is not enough<br>~~<br><a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lambda</span></a> <a href="https://infosec.exchange/tags/Private" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Private</span></a> <a href="https://infosec.exchange/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> </p><p><a href="https://medium.com/cloud-security/restricting-the-ability-to-invoke-a-lambda-function-to-a-private-network-775461f53fa8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/rest</span><span class="invisible">ricting-the-ability-to-invoke-a-lambda-function-to-a-private-network-775461f53fa8</span></a></p>
Teri Radichel<p>Troubleshooting Lambda Networking<br>~~<br>ACM.308 Validating private network access and troubleshooting issues access from a private VPC through a NAT<br>~~<br><a href="https://infosec.exchange/tags/lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lambda</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://infosec.exchange/tags/vpc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpc</span></a> <a href="https://infosec.exchange/tags/troubleshooting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>troubleshooting</span></a> <a href="https://infosec.exchange/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> </p><p><a href="https://medium.com/cloud-security/troubleshooting-lambda-networking-c6a957746407" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/trou</span><span class="invisible">bleshooting-lambda-networking-c6a957746407</span></a></p>
Teri Radichel<p>VPC with a <a href="https://infosec.exchange/tags/NAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAT</span></a> and a <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> <a href="https://infosec.exchange/tags/Endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Endpoint</span></a> Deployed With <a href="https://infosec.exchange/tags/CloudFormation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudFormation</span></a><br>~~<br>ACM.276 Allow a <a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lambda</span></a> function in a private network to access <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> via a NAT and <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CodeCommit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeCommit</span></a> via a VPC <a href="https://infosec.exchange/tags/Endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Endpoint</span></a> <br>~~<br>by Teri Radichel | July 31, 2023<br><a href="https://infosec.exchange/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://infosec.exchange/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p><p><a href="https://medium.com/cloud-security/vpc-and-nat-and-a-vpcendpoint-deployed-with-cloudformation-229870a3d008" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/vpc-</span><span class="invisible">and-nat-and-a-vpcendpoint-deployed-with-cloudformation-229870a3d008</span></a></p>
Teri Radichel<p>Deploy a Public and Private Subnet in an <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> <br>~~~<br>Not simple. And not done. I’ll check in the code when I’m done with the sub-series on deploying a static website in S3.<br>~~~<br>by Teri Radichel | July 28, 2023 <br><a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a> <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a></p><p><a href="https://medium.com/cloud-security/deploy-a-public-and-private-subnet-in-an-aws-vpc-41b1b5dd6364" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/depl</span><span class="invisible">oy-a-public-and-private-subnet-in-an-aws-vpc-41b1b5dd6364</span></a></p>
Teri Radichel<p>Architecture with Transit Gateway in an AWS Organization ~ In last few posts in this series I’ve been pondering options for a <a href="https://infosec.exchange/tags/Lambda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lambda</span></a> function in a <a href="https://infosec.exchange/tags/VPC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPC</span></a> that needs to reach the Internet via a <a href="https://infosec.exchange/tags/NAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAT</span></a> and related concerns.<br>~~~<br>by Teri Radichel | Jul 26, 2023 </p><p><a href="https://medium.com/cloud-security/architecture-with-transit-gateway-in-an-aws-organization-ee1c218ed469" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/arch</span><span class="invisible">itecture-with-transit-gateway-in-an-aws-organization-ee1c218ed469</span></a></p>