<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Shiva Sai Peddy</title>
    <description>The latest articles on DEV Community by Shiva Sai Peddy (@shivasaipeddy).</description>
    <link>https://dev.to/shivasaipeddy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2934011%2F646ed29a-e77b-4f70-95c9-d0a9a34d2845.png</url>
      <title>DEV Community: Shiva Sai Peddy</title>
      <link>https://dev.to/shivasaipeddy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/shivasaipeddy"/>
    <language>en</language>
    <item>
      <title>🚀 Streamlining Infrastructure Management and Enhancing End User Geolocation with AWS ECS, Lambda, and CloudFront</title>
      <dc:creator>Shiva Sai Peddy</dc:creator>
      <pubDate>Sun, 01 Jun 2025 15:47:22 +0000</pubDate>
      <link>https://dev.to/shivasaipeddy/streamlining-infrastructure-management-and-enhancing-end-user-geolocation-with-aws-ecs-lambda-i1o</link>
      <guid>https://dev.to/shivasaipeddy/streamlining-infrastructure-management-and-enhancing-end-user-geolocation-with-aws-ecs-lambda-i1o</guid>
      <description>&lt;p&gt;In this article, I’ll walk you through the architecture and implementation details of an application hosted on AWS ECS (using the Fargate launch type). We’ll explore how to build a CI/CD pipeline with AWS services like CodePipeline and CodeBuild, containerize our application, and add a geolocation feature using AWS Lambda, CloudFront, and S3. Let’s dive in!&lt;/p&gt;




&lt;h2&gt;
  
  
  1️⃣ Introduction
&lt;/h2&gt;

&lt;p&gt;Managing infrastructure at scale can be challenging. Our goal was to:&lt;br&gt;
✅ Simplify deployment using a serverless container approach.&lt;br&gt;
✅ Automate the entire CI/CD pipeline.&lt;br&gt;
✅ Enhance the application by identifying the &lt;strong&gt;geolocation of end users&lt;/strong&gt; using CloudFront logs and Lambda.&lt;/p&gt;




&lt;h2&gt;
  
  
  2️⃣ Architecture Overview
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F296a6yzoqckk60kszypz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F296a6yzoqckk60kszypz.png" alt="Architecture" width="800" height="438"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here’s a high-level look at the architecture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub Repository&lt;/strong&gt;: Stores the source code.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS CodePipeline&lt;/strong&gt;: Manages the CI/CD workflow.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS ECR&lt;/strong&gt;: Hosts Docker images.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS ECS (Fargate)&lt;/strong&gt;: Runs containerized applications in a serverless manner.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Secrets Manager&lt;/strong&gt;: Manages credentials securely.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS CloudFront&lt;/strong&gt;: Serves the application with low latency.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Lambda&lt;/strong&gt;: Extracts and processes geolocation data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon S3&lt;/strong&gt;: Stores CloudFront logs, build artifacts, and geolocation data.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  3️⃣ CI/CD Workflow
&lt;/h2&gt;

&lt;p&gt;Here’s how we automated the deployment pipeline:&lt;/p&gt;

&lt;h3&gt;
  
  
  🛠️ Build Stage:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CodePipeline detects changes in GitHub.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;It triggers CodeBuild to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fetch the latest code.&lt;/li&gt;
&lt;li&gt;Build a Docker image.&lt;/li&gt;
&lt;li&gt;Push the image to ECR using credentials from Secrets Manager.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  🚀 Deploy Stage:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Upon a successful build, CodePipeline triggers the deploy stage.&lt;/li&gt;
&lt;li&gt;ECS (Fargate) is updated with the latest Docker image.&lt;/li&gt;
&lt;li&gt;ECS handles deployment seamlessly.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  4️⃣ Geolocation Workflow
&lt;/h2&gt;

&lt;p&gt;Here’s how we identify the geolocation of users:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CloudFront logs user request headers to S3.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;An event trigger invokes AWS Lambda (Python).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lambda parses IP addresses from logs.&lt;/li&gt;
&lt;li&gt;Lambda queries a geolocation API for details.&lt;/li&gt;
&lt;li&gt;Lambda performs MapReduce on the data (aggregating results).&lt;/li&gt;
&lt;li&gt;The final geolocation data is stored in S3.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h2&gt;
  
  
  5️⃣ Implementation Details
&lt;/h2&gt;

&lt;p&gt;Here’s a quick rundown on setup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub&lt;/strong&gt;: Configure branches and CI/CD triggers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CodePipeline&lt;/strong&gt;: Define stages, source provider (GitHub), build settings (Docker), and deployment to ECS.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ECR&lt;/strong&gt;: Create a repository to store Docker images.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ECS&lt;/strong&gt;: Setup a Fargate cluster and service.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secrets Manager&lt;/strong&gt;: Store credentials securely.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IAM Roles&lt;/strong&gt;: Allow CodePipeline to interact with AWS services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CloudFront&lt;/strong&gt;: Distribute content with low latency.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lambda&lt;/strong&gt;: Python script to extract and store geolocation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;S3&lt;/strong&gt;: Store build artifacts and logs.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  6️⃣ Benefits
&lt;/h2&gt;

&lt;p&gt;✅ &lt;strong&gt;Serverless Deployment&lt;/strong&gt;: No need to manage EC2 instances - thanks to Fargate.&lt;br&gt;
✅ &lt;strong&gt;Automation&lt;/strong&gt;: CI/CD reduces manual steps and errors.&lt;br&gt;
✅ &lt;strong&gt;Scalability&lt;/strong&gt;: Fargate and Lambda scale automatically.&lt;br&gt;
✅ &lt;strong&gt;Security&lt;/strong&gt;: Secrets Manager secures credentials.&lt;br&gt;
✅ &lt;strong&gt;Low-Latency Content Delivery&lt;/strong&gt;: CloudFront caches content at edge locations.&lt;br&gt;
✅ &lt;strong&gt;Serverless Execution&lt;/strong&gt;: Lambda runs code on-demand without servers.&lt;br&gt;
✅ &lt;strong&gt;Object Storage&lt;/strong&gt;: S3 is durable and scalable, perfect for logs and data.&lt;/p&gt;




&lt;h2&gt;
  
  
  7️⃣ Conclusion
&lt;/h2&gt;

&lt;p&gt;This article shows how to effectively deploy an application on AWS ECS Fargate while enhancing user experience with geolocation tracking. Using services like CodePipeline, ECR, ECS, Secrets Manager, Lambda, CloudFront, and S3, we’ve built a secure, scalable, and automated deployment pipeline.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/shivasaipeddybits/ecs-app" rel="noopener noreferrer"&gt;Here&lt;/a&gt; is the github repositort url for the application.&lt;/p&gt;




&lt;h2&gt;
  
  
  8️⃣ Future Plans
&lt;/h2&gt;

&lt;p&gt;🔧 Implement &lt;strong&gt;Infrastructure as Code&lt;/strong&gt; with AWS CloudFormation or Terraform.&lt;br&gt;
🌍 Develop a &lt;strong&gt;custom geolocation API&lt;/strong&gt; for advanced use cases.&lt;br&gt;
📈 Add &lt;strong&gt;monitoring and alerting&lt;/strong&gt; with AWS CloudWatch or third-party tools.&lt;br&gt;
🌐 Enable &lt;strong&gt;cross-region replication&lt;/strong&gt; for S3 to ensure data durability and disaster recovery.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>devops</category>
      <category>cicd</category>
      <category>serverless</category>
    </item>
    <item>
      <title>Cloud Security Technologies: CSPM, CASB, CIEM, CWPP and CNAPP in the AWS Ecosystem</title>
      <dc:creator>Shiva Sai Peddy</dc:creator>
      <pubDate>Sun, 25 May 2025 17:02:57 +0000</pubDate>
      <link>https://dev.to/shivasaipeddy/cloud-security-technologies-cspm-casb-cnapp-and-ciem-in-the-aws-ecosystem-2mig</link>
      <guid>https://dev.to/shivasaipeddy/cloud-security-technologies-cspm-casb-cnapp-and-ciem-in-the-aws-ecosystem-2mig</guid>
      <description>&lt;p&gt;As more companies move to the cloud, new security challenges are emerging. When using cloud service providers like &lt;strong&gt;Amazon Web Services (AWS)&lt;/strong&gt;, it's important to protect everything from misconfigured resources to user access, application workloads, and data shared with SaaS platforms.&lt;/p&gt;

&lt;p&gt;To address these challenges, four core categories of cloud security technologies have emerged:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CSPM&lt;/strong&gt; - Cloud Security Posture Management&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CASB&lt;/strong&gt; - Cloud Access Security Broker &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CIEM&lt;/strong&gt; - Cloud Infrastructure Entitlement Management&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CWPP&lt;/strong&gt; - Cloud Workload Protection Platform&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CNAPP&lt;/strong&gt; - Cloud-Native Application Protection Platform&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In this post, we’ll break each one down and explore &lt;strong&gt;how AWS supports or integrates with these models&lt;/strong&gt;, including use cases and tools.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡️ 1. Cloud Security Posture Management (CSPM)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🎯 Purpose
&lt;/h3&gt;

&lt;p&gt;CSPM tools continuously monitor and assess cloud resources to identify misconfigurations and ensure compliance with policies or regulatory standards.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ Capabilities
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Identify insecure or non-compliant configurations&lt;/li&gt;
&lt;li&gt;Enforce security baselines (e.g., CIS, NIST)&lt;/li&gt;
&lt;li&gt;Enable auto-remediation&lt;/li&gt;
&lt;li&gt;Provide multi-account, multi-region visibility&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔧 AWS Native Tools
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;AWS Config&lt;/strong&gt; - Rule based compliance tracking&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Security Hub&lt;/strong&gt; - Aggregates security findings&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon GuardDuty&lt;/strong&gt; - Detects threats from poor posture&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Trusted Advisor&lt;/strong&gt; - Security best practice checks&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Example
&lt;/h3&gt;

&lt;p&gt;Security Hub detects an S3 bucket with public read access. AWS Config automatically triggers a remediation to revoke access.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔐 2. Cloud Access Security Broker (CASB)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🎯 Purpose
&lt;/h3&gt;

&lt;p&gt;CASB platforms sit between users and cloud services (typically SaaS) to enforce security policies and monitor data transfers.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ Capabilities
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shadow IT discovery&lt;/li&gt;
&lt;li&gt;DLP enforcement (e.g., sensitive file sharing)&lt;/li&gt;
&lt;li&gt;Threat detection (e.g., compromised accounts)&lt;/li&gt;
&lt;li&gt;OAuth app control&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🚫 AWS Native Support
&lt;/h3&gt;

&lt;p&gt;AWS &lt;strong&gt;does not provide a native CASB&lt;/strong&gt;. However, CASBs can integrate with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;AWS IAM&lt;/strong&gt; (for access control)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS CloudTrail&lt;/strong&gt; (for user activity logs)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon S3&lt;/strong&gt; (for DLP enforcement)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Example
&lt;/h3&gt;

&lt;p&gt;A CASB detects a file containing PII being uploaded to a personal Dropbox account and blocks the transfer.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔗 Popular Vendors
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Microsoft Defender for Cloud Apps&lt;/li&gt;
&lt;li&gt;Netskope&lt;/li&gt;
&lt;li&gt;McAfee MVISION Cloud&lt;/li&gt;
&lt;li&gt;Palo Alto Prisma SaaS&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  👤 3. Cloud Infrastructure Entitlement Management (CIEM)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🎯 Purpose
&lt;/h3&gt;

&lt;p&gt;CIEM helps manage identity permissions, ensuring users and workloads follow least privilege access principles.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ Capabilities
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Visualize access across accounts/services&lt;/li&gt;
&lt;li&gt;Detect overprivileged roles or unused permissions&lt;/li&gt;
&lt;li&gt;Automate rightsizing policies&lt;/li&gt;
&lt;li&gt;Govern third-party access&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔧 AWS Native Tools
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IAM Access Analyzer&lt;/strong&gt; - Flags unused or risky permissions&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Access Advisor&lt;/strong&gt; - Reports last-used permissions&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Identity Center (SSO)&lt;/strong&gt; - Central access management&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Service Control Policies (SCPs)&lt;/strong&gt; - Organization-wide access limits&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  💡 Example
&lt;/h3&gt;

&lt;p&gt;A Lambda function has &lt;code&gt;AdministratorAccess&lt;/code&gt; but only sends messages to SQS. IAM Access Analyzer flags this, and a policy update is suggested.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔗 Popular Vendors
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sonrai Security&lt;/li&gt;
&lt;li&gt;Ermetic&lt;/li&gt;
&lt;li&gt;CyberArk&lt;/li&gt;
&lt;li&gt;SailPoint&lt;/li&gt;
&lt;li&gt;Microsoft CloudKnox&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧩 4. Cloud Workload Protection Platform (CWPP)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🎯 Purpose
&lt;/h3&gt;

&lt;p&gt;CWPP focuses on securing workloads such as VMs, containers, serverless functions whether running in cloud, on-prem, or hybrid environments.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ Capabilities
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Runtime protection of EC2, ECS, Lambda, etc.&lt;/li&gt;
&lt;li&gt;File integrity monitoring&lt;/li&gt;
&lt;li&gt;Host-level anomaly detection&lt;/li&gt;
&lt;li&gt;Application allow/deny listing&lt;/li&gt;
&lt;li&gt;Vulnerability and malware detection&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔧 AWS Native Tools
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Amazon Inspector&lt;/strong&gt; - Finds vulnerabilities in EC2 and container images&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon GuardDuty&lt;/strong&gt; - Detects suspicious behavior and malware&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Systems Manager&lt;/strong&gt; - Manages patches and configurations&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS CloudTrail + Config&lt;/strong&gt; - Provide forensic context and change tracking&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;CWPP often overlaps with CNAPP in functionality, especially in runtime protection and vulnerability management.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  💡 Example
&lt;/h3&gt;

&lt;p&gt;GuardDuty detects unusual login attempts on an EC2 instance, and Systems Manager is used to temporarily block access and investigate.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔗 Popular Vendors
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Trend Micro&lt;/li&gt;
&lt;li&gt;CrowdStrike Falcon Cloud Workload&lt;/li&gt;
&lt;li&gt;Prisma Cloud Compute&lt;/li&gt;
&lt;li&gt;Aqua Security&lt;/li&gt;
&lt;li&gt;SentinelOne&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔒 5. Cloud-Native Application Protection Platform (CNAPP)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  🎯 Purpose
&lt;/h3&gt;

&lt;p&gt;CNAPP unifies multiple security layers - CSPM, CWPP (workload protection), and CIEM to provide full stack security across the application lifecycle.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ Capabilities
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Image/container vulnerability scanning&lt;/li&gt;
&lt;li&gt;Identity and access analysis&lt;/li&gt;
&lt;li&gt;Runtime workload protection&lt;/li&gt;
&lt;li&gt;Shift-left security via CI/CD integration&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔧 AWS Native Tools
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Amazon Inspector&lt;/strong&gt; - Vulnerability scanning (EC2, ECR)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon GuardDuty&lt;/strong&gt; -  Threat detection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS Security Hub&lt;/strong&gt; - Centralizes alerts&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AWS CodeWhisperer / CodeGuru&lt;/strong&gt; - Secure code generation/analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IAM Access Analyzer&lt;/strong&gt; - Identity assessment&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;📝 Note: AWS does &lt;strong&gt;not&lt;/strong&gt; provide a single CNAPP platform, but you can build one using these services or integrate a third-party CNAPP.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  💡 Example
&lt;/h3&gt;

&lt;p&gt;Amazon Inspector flags a vulnerable container image. GuardDuty later detects outbound traffic to an unknown domain. These are correlated in Security Hub.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔗 Popular Vendors
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Wiz&lt;/li&gt;
&lt;li&gt;Prisma Cloud (Palo Alto)&lt;/li&gt;
&lt;li&gt;Orca Security&lt;/li&gt;
&lt;li&gt;Lacework&lt;/li&gt;
&lt;li&gt;Microsoft Defender for Cloud&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  📊 Summary Table
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Function&lt;/th&gt;
&lt;th&gt;AWS Native Support&lt;/th&gt;
&lt;th&gt;Example&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CSPM&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Config &amp;amp; compliance&lt;/td&gt;
&lt;td&gt;✅ AWS Config, Security Hub&lt;/td&gt;
&lt;td&gt;Public S3 bucket auto-remediated&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CASB&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SaaS visibility &amp;amp; DLP&lt;/td&gt;
&lt;td&gt;❌ 3rd-party only&lt;/td&gt;
&lt;td&gt;Block PII upload to Dropbox&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CIEM&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Identity entitlement control&lt;/td&gt;
&lt;td&gt;✅ IAM Analyzer, SSO, SCPs&lt;/td&gt;
&lt;td&gt;Detect &amp;amp; fix overprivileged roles&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CWPP&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Workload runtime protection&lt;/td&gt;
&lt;td&gt;✅ Inspector, GuardDuty, SSM&lt;/td&gt;
&lt;td&gt;Detect &amp;amp; Block unusual login attempts on EC2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CNAPP&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;App lifecycle protection&lt;/td&gt;
&lt;td&gt;⚠️ Partial (Inspector, GuardDuty)&lt;/td&gt;
&lt;td&gt;Scan ECR image &amp;amp; detect threats&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  🔚 Final Thoughts
&lt;/h2&gt;

&lt;p&gt;No single tool or platform can secure your cloud environment alone. By leveraging technologies like &lt;strong&gt;CSPM&lt;/strong&gt;, &lt;strong&gt;CASB&lt;/strong&gt;, &lt;strong&gt;CIEM&lt;/strong&gt;, &lt;strong&gt;CWPP&lt;/strong&gt;, and &lt;strong&gt;CNAPP&lt;/strong&gt; and integrating them with &lt;strong&gt;AWS-native services&lt;/strong&gt;, you can build a layered, scalable cloud security strategy.&lt;/p&gt;

&lt;p&gt;🔐 Stay proactive. Secure continuously. Build securely.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>devops</category>
      <category>cloud</category>
    </item>
    <item>
      <title>A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS</title>
      <dc:creator>Shiva Sai Peddy</dc:creator>
      <pubDate>Fri, 16 May 2025 20:42:52 +0000</pubDate>
      <link>https://dev.to/shivasaipeddy/a-simple-aws-powered-clinic-appointment-system-app-using-docker-and-sns-3aod</link>
      <guid>https://dev.to/shivasaipeddy/a-simple-aws-powered-clinic-appointment-system-app-using-docker-and-sns-3aod</guid>
      <description>&lt;p&gt;Deploying full-stack applications on AWS doesn’t have to be overwhelming.&lt;/p&gt;

&lt;p&gt;In this article, I’ll show how I built a basic Clinic Appointment Management System using Docker, FastAPI, and a few core AWS services. The app lets patients book appointments online, sends real-time notifications, and provides a secure way for admins to manage data - all in a lightweight and scalable setup.&lt;/p&gt;

&lt;p&gt;If you're looking to get hands-on experience with deploying microservices on AWS, this beginner-friendly project is a great place to start!&lt;/p&gt;

&lt;h2&gt;
  
  
  Project Overview
&lt;/h2&gt;

&lt;p&gt;This system enables:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Patients to book appointments via a simple web UI.&lt;/li&gt;
&lt;li&gt;Real-time SMS/email notifications using AWS SNS.&lt;/li&gt;
&lt;li&gt;Admins to access the backend securely through OpenVPN.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With its lightweight and modular setup, this architecture is well-suited for beginners and rapid prototyping.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2rqgjgsibfwziek48z7c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2rqgjgsibfwziek48z7c.png" alt="Clinic System Architecture" width="800" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Architecture Overview
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. VPC Setup
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CIDR Block&lt;/strong&gt;: &lt;code&gt;12.0.0.0/16&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Split into &lt;strong&gt;Public&lt;/strong&gt; and &lt;strong&gt;Private&lt;/strong&gt; subnets for better isolation and control.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Internet Gateway&lt;/strong&gt; for public services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;NAT Gateway&lt;/strong&gt; to allow private instances to access the internet securely (for updates, etc.).&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. Public Subnet Components
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Application Load Balancer (ALB)
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Routes incoming traffic (HTTP/HTTPS) to backend services.&lt;/li&gt;
&lt;li&gt;Secured via security groups that limit access to only web ports.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  OpenVPN Server
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Deployed on an EC2 instance with an &lt;strong&gt;Elastic IP&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Allows secure, encrypted access to internal services.&lt;/li&gt;
&lt;li&gt;Only accessible on &lt;strong&gt;UDP Port 1194&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. Private Subnet Components
&lt;/h3&gt;

&lt;p&gt;This is where the core application logic lives - isolated from the internet.&lt;/p&gt;

&lt;h4&gt;
  
  
  Dockerized Microservices
&lt;/h4&gt;

&lt;p&gt;Deployed on an EC2 instance using &lt;strong&gt;Docker Compose&lt;/strong&gt;, the system includes:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Service&lt;/th&gt;
&lt;th&gt;Port&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Frontend&lt;/td&gt;
&lt;td&gt;8000&lt;/td&gt;
&lt;td&gt;Public-facing web UI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Patient Service&lt;/td&gt;
&lt;td&gt;8001&lt;/td&gt;
&lt;td&gt;Manages patient registration/data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Doctor Service&lt;/td&gt;
&lt;td&gt;8002&lt;/td&gt;
&lt;td&gt;Manages doctors and schedules&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Appointment Service&lt;/td&gt;
&lt;td&gt;8003&lt;/td&gt;
&lt;td&gt;Handles bookings and availability&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Notification Service&lt;/td&gt;
&lt;td&gt;8004&lt;/td&gt;
&lt;td&gt;Sends confirmations via SNS&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Each service uses a lightweight &lt;code&gt;python3.12-slim&lt;/code&gt; base with &lt;strong&gt;FastAPI&lt;/strong&gt; + &lt;strong&gt;Uvicorn&lt;/strong&gt; for rapid performance.&lt;/p&gt;

&lt;h4&gt;
  
  
  PostgreSQL Database
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Dockerized inside the private subnet.&lt;/li&gt;
&lt;li&gt;Stores patient, doctor, and appointment records.&lt;/li&gt;
&lt;li&gt;Only accessible from within the VPC.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Admin Access with OpenVPN
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Admins connect via a VPN client to access the private network.&lt;/li&gt;
&lt;li&gt;Once authenticated, the admin accesses the PostgreSQL instance within the private subnet using a SQL client.&lt;/li&gt;
&lt;li&gt;No direct database exposure to the internet - ever.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  5. DNS &amp;amp; Multi-AZ Load Balancing
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Application Load Balancer provides a &lt;strong&gt;DNS endpoint&lt;/strong&gt; for the frontend.&lt;/li&gt;
&lt;li&gt;Services are deployed across multiple Availability Zones (&lt;code&gt;us-east-1a&lt;/code&gt; &amp;amp; &lt;code&gt;us-east-1b&lt;/code&gt;) to increase resilience.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  6. Real-Time Notifications with AWS SNS
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The &lt;strong&gt;Notification Service&lt;/strong&gt; integrates with &lt;strong&gt;AWS SNS&lt;/strong&gt; to send:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SMS messages&lt;/li&gt;
&lt;li&gt;Email confirmations&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;&lt;p&gt;SNS scales automatically and ensures reliable message delivery.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;




&lt;h3&gt;
  
  
  7. Security Practices
&lt;/h3&gt;

&lt;p&gt;Security is built-in, not bolted on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;IAM Roles &amp;amp; Policies&lt;/strong&gt;: Restrict and manage AWS access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Groups&lt;/strong&gt;: Only necessary ports are open.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Private Subnets&lt;/strong&gt;: Critical services are not internet-facing.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;OpenVPN&lt;/strong&gt;: Admins can only access internal systems after authentication.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  8. Monitoring &amp;amp; Observability
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;AWS CloudWatch&lt;/strong&gt; tracks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EC2 metrics&lt;/li&gt;
&lt;li&gt;SNS delivery logs&lt;/li&gt;
&lt;li&gt;Application logs from microservices&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;This helps in performance tuning and alerting.&lt;/p&gt;




&lt;h3&gt;
  
  
  9. Designed for Scalability
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Load Balancer&lt;/strong&gt; enables horizontal scaling of services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Docker Microservices&lt;/strong&gt; can be updated independently.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SNS&lt;/strong&gt; automatically handles messaging load increases.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  10. Future Enhancements
&lt;/h3&gt;

&lt;p&gt;Here’s what’s next on the roadmap to make this production-ready:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;✅ Add HTTPS support using SSL on the Load Balancer.&lt;/li&gt;
&lt;li&gt;✅ Use &lt;strong&gt;AWS RDS&lt;/strong&gt; for managed PostgreSQL.&lt;/li&gt;
&lt;li&gt;✅ Build a CI/CD pipeline (AWS CodePipeline).&lt;/li&gt;
&lt;li&gt;✅ Migrate to &lt;strong&gt;ECS&lt;/strong&gt; or &lt;strong&gt;EKS&lt;/strong&gt; for better container orchestration.&lt;/li&gt;
&lt;li&gt;✅ Use &lt;strong&gt;Route 53&lt;/strong&gt; for domain-level routing.&lt;/li&gt;
&lt;li&gt;✅ Enable &lt;strong&gt;WAF&lt;/strong&gt;, &lt;strong&gt;GuardDuty&lt;/strong&gt;, &lt;strong&gt;Inspector&lt;/strong&gt; for advanced security.&lt;/li&gt;
&lt;li&gt;✅ Set up alerting for downtime or intrusions.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  💬 Final Thoughts
&lt;/h2&gt;

&lt;p&gt;This project taught me how to combine infrastructure best practices with microservices architecture, all while staying secure and scalable. It’s a solid base for health tech applications, appointment systems, and even e-commerce platforms. &lt;a href="https://github.com/shivasaipeddybits/clinic-queue-and-appointment-management-system" rel="noopener noreferrer"&gt;Here&lt;/a&gt; is the github repository url for the application.&lt;/p&gt;

&lt;p&gt;If you're starting your journey with AWS, Docker, or cloud security, this architecture offers a hands-on example with real-world value.&lt;/p&gt;

&lt;p&gt;Let me know what you think - and I’d love to hear how &lt;em&gt;you&lt;/em&gt; would extend or improve this setup!&lt;/p&gt;




</description>
      <category>aws</category>
      <category>devops</category>
      <category>security</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
