• Home
  • Talks
  • About me
  • Privacy Policy
  • Develop lightweight and secure REST APIs with AWS Lambda Function URL and Terraform

    Develop lightweight and secure REST APIs with AWS Lambda Function URL and Terraform

    This post demonstrates how to leverage AWS Lambda Function URL for lightweight REST APIS, and how to configure Cloudfront and WAF for protection, all done with Terraform.

    May 3, 2024
  • Move fast and avoid surprises – Shift-left on cloud security with Policy-as-Code

    Move fast and avoid surprises – Shift-left on cloud security with Policy-as-Code

    Security issues can be fatal. Compromises can lead to sensitive information getting into the hands of malicious actors. For companies, it could lead to substantial damage to trust and reputation. In the series “Move fast and avoid surprises” I’m elaborating on topics and concepts I’ve learned that have had major impact in real-life situations. In the…

    December 19, 2023
  • Move fast and avoid surprises – Be Well-Architected

    Move fast and avoid surprises – Be Well-Architected

    In the series “Move fast and avoid surprises” I’m elaborating on topics and concepts I’ve learned that have had major impact in real-life situations. In the modern software industry, being fast is not sufficient on it’s own, if you get caught up in problems by breaking things along the way. I rather prefer to avoid surprises. To be able to make…

    December 18, 2023
  • AWS re:Invent guide – My approach for a successful experience

    AWS re:Invent guide – My approach for a successful experience

    The AWS re:Invent learning conference is the highlight of the year for many cloud professionals. But how can you make sure to avoid disappointments and get the most of out the experience? Read on to find out.

    November 12, 2023
  • Adopt Open ID Connect (OIDC) in Terraform for secure multi-account  CI/CD to AWS

    Adopt Open ID Connect (OIDC) in Terraform for secure multi-account CI/CD to AWS

    In this post we will explore how we can increase our security posture by leveraging Open ID Connect (OIDC) as authentication mechanism in CI/CD pipelines for deploying Terraform based infrastructure to Amazon Web Services (AWS). The first design principle of the Security Pillar of the AWS Well-Architected Framework sounds as follows:“Implement a strong identity foundation:…

    October 7, 2023
  • Achievement unlocked: AWS Black Belt Pilot – Containers

    Achievement unlocked: AWS Black Belt Pilot – Containers

    In my position as Principal Cloud Architect in Sopra Steria, I am fortunate to be involved in exciting projects where I get the opportunity to continuously expand my knowledge and expertise. Sopra Steria is an AWS Partner and recently I have been working on a project where Amazon Web Services invited a group of architects…

    September 6, 2023
  • Deploying WordPress on ECS with AWS Copilot

    Deploying WordPress on ECS with AWS Copilot

    When I decided to start a blog I naturally went through a lot of thoughts regarding how to solve my desired outcome. My main goal is to share knowledge and things I’ve learned which might be useful for others, but also to learn something new for myself during the process. I quickly decided that I…

    September 6, 2023
  • Hello world!

    Citizens celebrate, my blog is up and running. Stay tuned for personal reflections, experiences, cloud technology and Amazon Web Services.

    September 5, 2023
←Newer Posts

Home

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}