article thumbnail

Using Tailscale to Access Amazon VPCs, EC2 Instances, and RDS Clusters

Crafty CTO

Better Idea: AWS Systems Manager Session Manager Our development partner suggested a better solution, AWS Systems Manager Session Manager , which enables tunneled sessions into the AWS environment and leverages AWS IAM to manage access. The result: better security and no need for manual IP whitelisting.

article thumbnail

Cloud Prem Architecture - The New Way of Serving the Enterprise with a Hub and Spoke Data Model

Tom Tunguz

Typically, the data resides in the customer’s cloud account. This cloud account has many names but no real moniker yet. Some call it a VPC for virtual private cloud. Others call it cloud prem, a contraction of cloud and on-prem(ises). The third is compliance. The second is control.

Cloud 196
article thumbnail

SaaS Security: Basic Principles and Best Practices

SaaS Metrics

The three security layers that help prevent unauthorized access and safeguard valuable data include: Layer 0 aka IaaS (Infrastructure as a Service) is the primary layer on which everything else runs e.g. AWS, Google Cloud Platform, Microsoft Azure and IBM Cloud. VPC and VPN. End-to-end Encryption.