ACA Blog

Recent Posts

Recent Comments





How to secure your cloud with AWS Config

AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. This can be used for: security: validate security best practices on your AWS Account compliance: report on deviations on configuration for AWS resources based upon best practices or architectural principles and guidelines [...]

Peter JansPeter Jans

KubeCon | CloudNativeCon Europe 2019 recap

KubeCon – what a magnificent event it was, this time in Barcelona! And of course, ACA attended once again. Jan and Jeroen were ready for four days of Kubernetes learnings, keynotes, lightning talks, workshops, meetings with software vendors and some small parties. In this blog post, we’ll give a short recap of the KubeCon and [...]

Jan BeerdenJan Beerden

Our take on DevOps

In this blog post, we share our view on DevOps. This isn’t an in-depth technical article, but rather a high level overview of our workflows and methods. We’ll discuss our DevOps flows in application development and how we implement the same principles in our infrastructure workflows. We’ll also go over an area which we’re still exploring [...]


SSH Summer School: port forwarding

This blog post is the second of a 3 part series about SSH (Secure Shell) connections with OpenSSH. You can check out the first post here. The aim of this blog post series is to teach you more about SSH, so I call it SSH Summer School (even though, yes, it’s autumn now 🙂 ). In these blog posts, I assume you are using a UNIX-like [...]

Jan BeerdenJan Beerden