View Blog Post

Monitor GCP Costs in Slack

Stelligent has a variety of projects running on Google Cloud Platform, and we want to be diligent about controlling our costs. As a long-time remote-first enterprise, our communication centers around Slack, and we want all of our alerts to be delivered there. We’ve developed a simple way to connect Google Cloud Billing to Slack by Read more…

View Blog Post

Removing Errors on CloudFormation Stack Creation

OVERVIEW Administering AWS infrastructure through CloudFormation is one way to use Infrastructure as Code to simplify and replicate an environment. Here at Stelligent, we encourage using automation to apply CloudFormation templates. An early hurdle with CloudFormation one might encounter is a mistake that would break the initial creation of the stack. When CloudFormation fails during Read more…

View Blog Post

Is My Container Image Secure? CI/CD Container Scanning using Trend Micro Deep Security Smart Check and AWS CodePipeline

Introduction Many enterprises attempt to drive software development and delivery towards a DevOps mindset. Likewise, organizations struggle with increasing security challenges while adopting these innovative software practices. Embedding security within the deployment lifecycle is non-negotiable. Therefore, integration of security into CI/CD workflows need to be done cautiously to meet an ever-evolving technology landscape. DevSecOps is Read more…

View Blog Post

Generating Least Privileged IAM Roles for CloudFormation and Service Catalog with cfn-leaprog

CloudFormation Development Process and Privilege As a developer works through the development of a CloudFormation template, they are likely working in a “sandbox” account where they have significant “power user” privileges.  This is convenient in order to allow the developer to focus on the business needs, but what happens when the same template is converged Read more…

View Blog Post

Introduction to Amazon Inspector

This is part one of a two part series on Amazon Inspector. This article goes over some of the features of Amazon Inspector and covers some of the pros and cons of the service. The second article within this series is a quick start on implementing Amazon Inspector in automated AMI pipelines.  Introduction to Amazon Read more…

View Blog Post

Building Developer Sandboxes on AWS with Attribute-based access control (ABAC)

Identity Management had a curious beginning in the early 1500s in England, where parish churches kept elaborate written records “for the purpose of preventing bigamy and consanguineous marriage.” It was the invention of the automobile 400 years later that furthered the creation of personal identification when in 1903 two US states issued the first driver’s Read more…

View Blog Post

Reduce Cost and Increase Efficiency with DevOps

Do More with Less Today DevOps can mean different things to different people. At Stelligent we consider DevOps to be a collection of principles and practices for delivering software faster, more efficiently, and more securely. When implemented effectively, these principles and practices will make your team more efficient and effective, allowing you to do more Read more…

View Blog Post

5 Practical Tips for Making Remote Work Successful

Editor’s Note: Stelligent has been a remote-first company since 2013. All of our employees work from home, providing cloud consulting services to the public sector and corporations all over the United States. We love our remote culture, but the arrangement has its challenges. We’re publishing a series of articles to share our insights with everyone Read more…

View Blog Post

Tips to Help Your Remote Team Work Effectively

Editor’s Note: Stelligent has been a remote-first company since 2013. All of our employees work from home, providing cloud consulting services to the public sector and corporations all over the United States. We love our remote culture, but the arrangement has its challenges. We’re publishing a series of articles to share our insights with everyone Read more…

View Blog Post

Automate Container Security Scans in Your CI/CD Pipeline with AWS ECS

Many enterprises attempt to drive software development and delivery towards a DevOps mindset. Likewise, organizations struggle with increasing security challenges while adopting these innovative software practices. Embedding security within the deployment lifecycle is non-negotiable. Therefore, integration of security into CI/CD workflows need be done cautiously to meet an ever-evolving technology landscape. DevSecOps is an important Read more…