<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>OPIT - Open Institute of Technology</provider_name><provider_url>https://www.opit.com</provider_url><author_name>OPIT - Open Institute of Technology</author_name><author_url>https://www.opit.com/author/opit-open-institute-of-technology/</author_url><title>ComputerWeekly: What are the best practices for securing AWS tech stacks? - OPIT - Open Institute of Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="jQ3fwCBZdq"&gt;&lt;a href="https://www.opit.com/magazine/computerweekly-what-are-the-best-practices-for-securing-aws-tech-stacks/"&gt;ComputerWeekly: What are the best practices for securing AWS tech stacks?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.opit.com/magazine/computerweekly-what-are-the-best-practices-for-securing-aws-tech-stacks/embed/#?secret=jQ3fwCBZdq" width="600" height="338" title="&#x201C;ComputerWeekly: What are the best practices for securing AWS tech stacks?&#x201D; &#x2014; OPIT - Open Institute of Technology" data-secret="jQ3fwCBZdq" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.opit.com/wp-content/uploads/2025/06/Cloud-Security-Image-e1748895364520.jpg</thumbnail_url><thumbnail_width>1220</thumbnail_width><thumbnail_height>685</thumbnail_height><description>Source: Computer Weekly, published on May 27th, 2025 By Nicholas Fearn An AWS tech stack can aid business growth and facilitate efficient operations, but misconfigurations have become all too common and stall this progress Amazon Web Services&#xA0;(AWS) has become the lifeblood of millions of modern businesses, both big and small. But while this popular cloud [&hellip;]</description></oembed>