Skip to content

Cloud Security

Azure Well-Architected Framework

The Azure Well-Architected Framework helps you to design, build, and continuously improve a secure, reliable, and efficient application.

Start with the Pillars, and align your design choices with the principles. Then, build a strong foundation for your workload based on technical design areas. Finally, use review tools to assess your readiness in deploying to production.

When you're building an Azure architecture, there are many considerations to keep in mind. You want your architecture to be secure, scalable, available, and recoverable. To make that possible, you have to make decisions based on cost, organizational priorities, and risk.

Deploy a Desktop on AWS Using Terraform

This terraform script deploys an Ubuntu Workstation with minimal additional software installed. It enables SSH and RDP and uses security groups to restrict the administrative access to your current external IP address only to prevent it being wide open to the world.

An example use case is a temporary sandbox system for surfing potentially dangerous websites.

NOTE: Don't break the law, as AWS Terms of Service still apply and this is not exactly covert.

Deploy a Desktop on GCP Using Terraform

This terraform script deploys an Ubuntu Workstation with minimal additional software installed. It enables SSH and RDP and uses security groups to restrict the administrative access to your current external IP address only to prevent it being wide open to the world.

An example use case is a temporary sandbox system for surfing potentially dangerous websites.

NOTE: Don't break the law, as GCP Terms of Service still apply and this is not exactly covert.

Deploy a Desktop on Azure Using Terraform

This terraform script deploys an Ubuntu Workstation with minimal additional software installed. It enables SSH and RDP and uses security groups to restrict the administrative access to your current external IP address only to prevent it being wide open to the world.

An example use case is a temporary sandbox system for surfing potentially dangerous websites.

NOTE: Don't break the law, as Azure Terms of Service still apply and this is not exactly covert.