luizmachado.dev

PT EN

SQS Admin Panel: a serverless panel to manage SQS queues

Meet SQS Admin Panel, a 100% serverless web panel to manage Amazon SQS queues with dashboard, DLQ redrive, export/import and one-command deploy.

Arch CLI: the Swiss Army Knife for Architecture, SRE and DevOps Teams on AWS

Deep dive into Arch CLI, an open source tool that centralizes AWS account management with security auditing, FinOps, containers, monitoring and AI-powered analysis.

AWS IAM Policy Autopilot: creating IAM policies straight from Kiro

Deep dive into AWS IAM Policy Autopilot, an open source tool that now works as a Kiro Power to automatically generate IAM policies from your code.

Using Sub Agents with Kiro CLI

Deep dive into sub agents in Kiro CLI: how they work, when to use them, orchestration patterns and practical examples to speed up your workflow.

The biggest lesson from AWS re:Invent 2025

A reflection on the purpose of technology and the Renaissance Developer concept presented by Werner Vogels at AWS re:Invent 2025.

Exploring Amazon GuardDuty ETD in Practice

Understand GuardDuty Extended Threat Detection (ETD), see examples of AttackSequence findings, and implement automated responses with EventBridge + Lambda.

Mastering DevSecOps in AWS: Policies-as-Code, SAST and Integrated Observability

Complete guide on DevSecOps in AWS: Policies-as-Code with CloudFormation Guard and OPA, SAST with Amazon Inspector Code, and observability with CloudWatch and X-Ray.

Amazon Inspector Code Security: Shift Left and Native SAST on AWS

Learn how the new Amazon Inspector code analysis feature lets you detect vulnerabilities directly in your repository, using SAST techniques integrated into AWS DevSecOps.

How to mitigate attacks on code agents in AWS

Strategies to prevent, detect and respond to attacks like Rules File Backdoor affecting Copilot/Cursor

How to Mitigate Ransomware Attacks on AWS

Comprehensive strategies to prevent, detect, and respond to ransomware attacks in AWS environments

Strategies to Mitigate Exfiltration Attacks on Amazon S3

Complete guide to protecting S3 data against exfiltration attacks using only AWS services

Amazon Inspector: Basic Concepts

Complete guide on Amazon Inspector: configuration, findings management, and best practices

AWS IAM Identity Center: From Basics to Advanced

Complete guide on AWS IAM Identity Center (SSO): configuration, IdP integration, and best practices

Getting to Know Prowler Open Source

Complete guide on Prowler: an open source tool for security auditing and compliance in AWS

Key Security Points for Provisioning an Application on Amazon ECS and Amazon EKS

Complete container security guide: comparison between ECS and EKS with best practices

Open Source Software to Strengthen Security on AWS

Complete guide to open source tools for reinforcing security in AWS environments: IDS/IPS, containers, SIEM and more

Amazon GuardDuty DeepDive: Advanced Threat Detection on AWS

Complete guide on Amazon GuardDuty: advanced features, multi-account integration, and response automation

Amazon ECS Details

Advanced guide on Amazon ECS: clusters, task definitions, security, observability, and high availability

AWS - Support Repository

Collaborative repository with practical examples and configurations for AWS

Top Security Announcements at AWS re:Invent 2024

Summary of the top security announcements at AWS re:Invent 2024