By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    McDonald’s Delaware Court Decision Will Change CCO World Forever
    21 February 2023
    Health Equity: Board Directors’ Most Important ESG Measure
    7 May 2023
    News Roundup: 75% of US Companies Mention Climate Risk in 10-Ks
    15 June 2024
    Latest News
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
    Strange Bedfellows: How a Supreme Court Ruling Found Its Perfect Match in the Trump Administration
    19 November 2025
    Where in the Loop? Testing AI Across 120 Compliance Tasks to Find Out Where Humans Are Most Needed
    13 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack
    18 March 2023
    Inside the High Risk of 3rd-Party SaaS Apps
    24 March 2023
    Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency • Graham Cluley
    30 March 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Star Wars Holiday Special Documentary Movie Review From SXSW
    24 March 2023
    ‘Wordle’ today: Here’s the answer, hints for April 3
    3 April 2023
    8 Ways to Know if You Have a Vitamin Deficiency
    12 April 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Ukraine aid bill inches forward in US Senate By Reuters
    10 February 2024
    Neil Young begrudgingly returns to Spotify
    13 March 2024
    White House will ‘wait and see’ on Iran response after Israel attack
    14 April 2024
    Latest News
    AI labs like Meta, Deepseek, and Xai earned worst grades possible on an existential safety index
    6 December 2025
    Visa is moving its European headquarters to London’s Canary Wharf, FT reports
    5 December 2025
    Client Challenge
    4 December 2025
    Binance names cofounder Yi He as new co-CEO
    3 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Cybercrime News For Apr. 26, 2023. Truman State University Suffers Cyberattack. WCYB Digital Radio
    28 April 2023
    Stream episode Cybercrime Wire For May 6-7, 2023. Weekend Update. WCYB Digital Radio. by Cybercrime Magazine podcast
    6 May 2023
    Cybersecurity Elevator Pitch: Penetration Testing As A Service. A Bugcrowd Platform.
    14 May 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: Separate Repositories for a Job Execution Framework, Job Images, and Job Configurations | by Teri Radichel | Cloud Security | Jan, 2024
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > network vulnerability > Separate Repositories for a Job Execution Framework, Job Images, and Job Configurations | by Teri Radichel | Cloud Security | Jan, 2024
network vulnerability

Separate Repositories for a Job Execution Framework, Job Images, and Job Configurations | by Teri Radichel | Cloud Security | Jan, 2024

webmaster
Last updated: 2024/01/19 at 3:18 AM
webmaster
Share
2 Min Read
SHARE


ACM.434 Also building docker containers with files from different directories or contexts and problems with buildx on Amazon Linux

Teri Radichel
Cloud Security

In the last post I explained how I want to restructure my accounts to support the job execution framework I’m building and why I need a separate container for the initial organization deployment — because there is no job execution framework when you initially start deploying.

Here’s where I make some changes I’ve wanted to demonstrate for a while. I want to create separate repositories for each job and the job configurations so people can create and run new jobs without changing the core job execution framework.

I’m going to create separate repositories for separate components. That provides the flexibility to easily add new types of jobs (containers) which I need to do now to create my root management account initialization container.

AWSJobExecutionFramework — A repository for the framework code that executes jobs using a common set of code. When someone deploys a job they can start with this reusable code base. This code base has the code to run the jobs only, nothing job-specific.

job-awsorginit — This repository contains a Dockerfile for the initial container image used to deploy the organization, initial user and role, and the first account and organization administrator in a new AWS account. You can’t use the job execution framework when the job execution framework hasn’t been deployed.

job-awsdeploy —This repository contains a Dockerfile used to build a container image that uses the job execution framework — meaning it requires an SSM parameter that contains the job configuration and a secret with credentials in the same account to deploy the job.

jobconfig-deploy — This repository contains the configurations for deployment jobs. In order to deploy a job using the awsdeploy job, the job configuration needs to first exist in SSM Parameters store. This repository maintains the job configurations separately from…



Source link

You Might Also Like

Ways to Tell if a Website Is Fake

McAfee Named ADVANCED+ in Real-World Protection — What That Means for You

How to Spot Charity Scams and Donate Safely this Giving Season

Demystifying the Offensive Security Landscape

Black Friday 2025: Strengthen Retail Cyber

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Stream episode Cybercrime Magazine Update: Public Companies Must Report Cyber Incidents In 4 Days. New SEC Rule. by Cybercrime Magazine podcast
Next Article Revers-A-Brella Auto Open Umbrella with Personal Alarm & Light on QVC
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
Ways to Tell if a Website Is Fake
network vulnerability 6 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?