Build an ML Powered Bird Classification Gallery on Hugo with DeepLens and S3

In this blog we will cover how to build an ML powered bird classification solution using a DeepLens, the Caltech CUB-200-2011 dataset and the ResNet 18 neural network architecture. The solution includes automatic image uploads to a Hugo Easy Gallery on S3. The project is still a bit in the scrappy MVP state but read on for the high level build flow. Check out the Bird Brain Gallery on my Hugo site. In this solution, we are classifying birds but the approach could also be used for security applications such as detecting strangers through facial recognition or even looking for images with weapons. ...

February 25, 2021 · 4 min · Cam

Enhance CloudFront origin security with WAF and Secrets Manager

When you deliver web content through a CDN such as CloudFront, a best practice is to prevent viewer requests from bypassing the CDN and accessing your origin content directly. In this blog post, you’ll see how to use CloudFront custom headers, AWS WAF, and AWS Secrets Manager to restrict viewer requests from accessing your CloudFront origin resources directly. read more ...

October 22, 2020 · 1 min · Cam

Get started with security response automation on AWS

In this blog post, you’ll learn to implement automated security response mechanisms within your AWS environments. This post will include common patterns, implementation considerations, and an example solution. Security response automation is a broad topic that spans many areas. The goal of this blog post is to introduce you to core concepts and help you get started. read more ...

November 26, 2019 · 1 min · Cam

Use Amazon GuardDuty and AWS Web Application Firewall to automatically block suspicious hosts

In this blog post, we’ll show you how to use Amazon GuardDuty to automatically update the AWS Web Application Firewall to automatically block suspicious hosts Web Access Control Lists (WebACLs) and VPC Network Access Control Lists (NACLs) in response to GuardDuty findings. After GuardDuty detects a suspicious activity, the solution updates these resources to block communication from the suspicious host while you perform additional investigation and remediation. Once communication has been blocked, further occurrences of a finding are reduced, allowing security and operations teams to focus more on higher priority tasks. read more ...

August 3, 2018 · 1 min · Cam

Use Amazon Alexa to Get Amazon GuardDuty Statistics and Findings

In this post, I show you how to deploy a sample custom Alexa skill and use an Alexa-enabled device, such as Amazon Echo, to get information about GuardDuty findings across your AWS accounts and regions. The information provided by this sample skill gives you a broad overview of GuardDuty finding statistics, severities, and descriptions. When you hear something interesting, you can log in to the GuardDuty console or another analysis tool to investigate the findings data. read more ...

April 3, 2018 · 1 min · Cam

Use Lambda@Edge and JSON Web Tokens to Enhance Web Application Security

Amazon Cognito lets you easily add user sign-up and sign-in to your mobile and web applications. In addition, Amazon Cognito supports OAuth 2.0 as an industry standard protocol for authorization, and the sample application in this blog post relies on JSON Web Tokens to authorize access to private content. JSON Web Token (JWT) is a JSON-based open standard for creating access tokens which assert a series of claims as a JSON object. JSON Web Tokens can also be signed using private/public key pairs in order to verify content authenticity and integrity. read more ...

January 29, 2018 · 1 min · Cam

Enhance the Security of Sensitive Customer Data by Using Amazon CloudFront Field-Level Encryption

CloudFront field-level encryption helps secure sensitive data such as a customer phone numbers by adding another security layer to CloudFront HTTPS. Using this functionality, you can help ensure that sensitive information in a POST request is encrypted at CloudFront edge locations. This information remains encrypted as it flows to and beyond your origin servers that terminate HTTPS connections with CloudFront and throughout the application environment. In this blog post, we demonstrate how you can enhance the security of sensitive data by using CloudFront field-level encryption. read more ...

December 14, 2017 · 1 min · Cam

Configure an LDAPS Endpoint for Simple AD

In this blog post, we show you how to configure an LDAPS (LDAP over SSL/TLS) encrypted endpoint for Simple AD so that you can extend Simple AD over untrusted networks. Our solution uses Elastic Load Balancing (ELB) to send decrypted LDAP traffic to HAProxy running on Amazon EC2, which then sends the traffic to Simple AD. read more ...

August 29, 2017 · 1 min · Cam

Monitor Host-Based Intrusion Detection System Alerts on Amazon EC2 Instances

In this blog post, I show how you can use Amazon CloudWatch Logs to collect and aggregate alerts from an open-source security (OSSEC) HIDS. I use a CloudWatch Logs subscription to deliver the alerts to Amazon Elasticsearch Service (Amazon ES) for analysis and visualization with Kibana – a popular open-source visualization tool. read more ...

March 17, 2017 · 1 min · Cam