{"id":160134,"date":"2025-09-19T09:46:02","date_gmt":"2025-09-19T09:46:02","guid":{"rendered":"http:\/\/13.204.104.114\/?p=160134"},"modified":"2025-12-18T15:56:06","modified_gmt":"2025-12-18T10:26:06","slug":"key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws","status":"publish","type":"post","link":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/","title":{"rendered":"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;1&#8243; bottom_padding=&#8221;1&#8243; back_image=&#8221;160139&#8243; back_attachment=&#8221;fixed&#8221; back_position=&#8221;center center&#8221; overlay_color=&#8221;color-105898&#8243; overlay_alpha=&#8221;40&#8243; overlay_animated=&#8221;yes&#8221; overlay_animated_1_color=&#8221;color-144745&#8243; overlay_animated_2_color=&#8221;color-434631&#8243; overlay_animated_speed=&#8221;1500&#8243; overlay_animated_size=&#8221;0.35&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; top_divider=&#8221;gradient&#8221; bottom_divider=&#8221;gradient&#8221; content_parallax=&#8221;1&#8243; content_parallax_safe=&#8221;yes&#8221; uncode_shortcode_id=&#8221;172492&#8243; front_end_with_slider=&#8221;true&#8221; el_class=&#8221;mobile-flex-bottom&#8221; overlay_animated_1_color_type=&#8221;uncode-palette&#8221; overlay_animated_2_color_type=&#8221;uncode-palette&#8221; overlay_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;bottom&#8221; gutter_size=&#8221;3&#8243; expand_height=&#8221;yes&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;368328&#8243;][uncode_slider slider_type=&#8221;fade&#8221; slider_interval=&#8221;0&#8243; slider_navspeed=&#8221;400&#8243; advanced_nav=&#8221;yes&#8221; el_id1=&#8221;slider-111384&#8243; el_id=&#8221;slider-111384&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;0&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221; front_end_with_slider=&#8221;true&#8221; uncode_shortcode_id=&#8221;190589&#8243;][vc_column_inner column_width_percent=&#8221;86&#8243; position_horizontal=&#8221;left&#8221; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;2&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;467377&#8243;][uncode_breadcrumbs][vc_empty_space empty_h=&#8221;1&#8243;][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-660432&#8243; text_size=&#8221;custom&#8221; text_weight=&#8221;400&#8243; css_animation=&#8221;single-curtain&#8221; uncode_shortcode_id=&#8221;128317&#8243; heading_custom_size=&#8221;50px&#8221;]Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][\/uncode_slider][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;3&#8243; bottom_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; uncode_shortcode_id=&#8221;214280&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;750128&#8243;][uncode_list uncode_shortcode_id=&#8221;115230&#8243;]<\/p>\n<ul>\n<li>Use\u00a0<strong>AWS Identity and Access Management (IAM<\/strong>) :\u00a0 to create and manage users, groups, and permissions. This will allow you to set up the least privileged access controls so that users only have the permissions they need to perform their specific tasks.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;139185&#8243;]<\/p>\n<ul>\n<li>Enable\u00a0<strong>Multi-Factor Authentication (MFA)<\/strong> : for all users who have access to sensitive data or AWS resources. This will add an extra layer of security, requiring users to provide a second authentication factor (such as a code sent to their phone) when they log in.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;271064&#8243;]<\/p>\n<ul>\n<li>Use\u00a0<strong>Amazon Virtual Private Cloud (VPC) :<\/strong>\u00a0to isolate your workloads in a private, secure network. This will allow you to create subnets, control access to resources, and set up network security rules.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;213266&#8243;]<\/p>\n<ul>\n<li>Use\u00a0<strong>AWS WAF<\/strong> : to protect your applications from common web exploits. AWS WAF is a web application firewall that lets you monitor and control incoming and outgoing traffic to your web applications.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;827600&#8243;]<\/p>\n<ul>\n<li>Use\u00a0<strong>AWS Shield<\/strong> : to protect against distributed denial of service (DDoS) attacks. AWS Shield is a managed DDoS protection service that automatically scales to protect your workloads against the largest and most sophisticated attacks.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;159091&#8243;]<\/p>\n<ul>\n<li>Use\u00a0<strong>AWS Secrets Manager<\/strong> : to securely store and manage your application secrets (such as database passwords, API keys, and other sensitive information). This will help you avoid hard-coding secrets in your code, and make it easier to rotate and manage them over time.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;132593&#8243;]<\/p>\n<ul>\n<li>Monitor your workloads for security vulnerabilities and compliance issues\u00a0<strong>using AWS Security Hub :<\/strong>\u00a0AWS Security Hub consolidates findings from multiple AWS services, third-party security solutions, and customer-defined policies, making it easier to identify and respond to security issues.<\/li>\n<\/ul>\n<p>[\/uncode_list][uncode_list uncode_shortcode_id=&#8221;188016&#8243;]<\/p>\n<ul>\n<li>Regularly back up your data using\u00a0<strong>AWS Backup :<\/strong>\u00a0AWS Backup is a fully managed backup service that makes it easy to automate and schedule backups of your data, helping to protect against data loss and accidental deletion.<\/li>\n<\/ul>\n<p>[\/uncode_list][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;1&#8243; bottom_padding=&#8221;1&#8243; back_image=&#8221;160139&#8243; back_attachment=&#8221;fixed&#8221; back_position=&#8221;center center&#8221; overlay_color=&#8221;color-105898&#8243; overlay_alpha=&#8221;40&#8243; overlay_animated=&#8221;yes&#8221; overlay_animated_1_color=&#8221;color-144745&#8243; overlay_animated_2_color=&#8221;color-434631&#8243; overlay_animated_speed=&#8221;1500&#8243; overlay_animated_size=&#8221;0.35&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":160139,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-160134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS - Pentagon System &amp; Services Pvt. Ltd<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS - Pentagon System &amp; Services Pvt. Ltd\" \/>\n<meta property=\"og:description\" content=\"[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;1&#8243; bottom_padding=&#8221;1&#8243; back_image=&#8221;160139&#8243; back_attachment=&#8221;fixed&#8221; back_position=&#8221;center center&#8221; overlay_color=&#8221;color-105898&#8243; overlay_alpha=&#8221;40&#8243; overlay_animated=&#8221;yes&#8221; overlay_animated_1_color=&#8221;color-144745&#8243; overlay_animated_2_color=&#8221;color-434631&#8243; overlay_animated_speed=&#8221;1500&#8243; overlay_animated_size=&#8221;0.35&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\" \/>\n<meta property=\"og:site_name\" content=\"Pentagon System &amp; Services Pvt. Ltd\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-19T09:46:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T10:26:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@services42257\" \/>\n<meta name=\"twitter:site\" content=\"@services42257\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\"},\"author\":{\"name\":\"Jeet\",\"@id\":\"https:\/\/www.pentagon.co.in\/#\/schema\/person\/3d20424663f9e7883693c846fe072a11\"},\"headline\":\"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS\",\"datePublished\":\"2025-09-19T09:46:02+00:00\",\"dateModified\":\"2025-12-18T10:26:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\/\/www.pentagon.co.in\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\",\"url\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\",\"name\":\"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS - Pentagon System &amp; Services Pvt. Ltd\",\"isPartOf\":{\"@id\":\"https:\/\/www.pentagon.co.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png\",\"datePublished\":\"2025-09-19T09:46:02+00:00\",\"dateModified\":\"2025-12-18T10:26:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage\",\"url\":\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png\",\"contentUrl\":\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pentagon.co.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pentagon.co.in\/#website\",\"url\":\"https:\/\/www.pentagon.co.in\/\",\"name\":\"Pentagon System & Services Pvt. Ltd\",\"description\":\"Get IT Solved\",\"publisher\":{\"@id\":\"https:\/\/www.pentagon.co.in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pentagon.co.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pentagon.co.in\/#organization\",\"name\":\"Pentagon System & Services Pvt. Ltd\",\"url\":\"https:\/\/www.pentagon.co.in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pentagon.co.in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/07\/Pentagon_Final-Logo_270625.png\",\"contentUrl\":\"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/07\/Pentagon_Final-Logo_270625.png\",\"width\":1326,\"height\":383,\"caption\":\"Pentagon System & Services Pvt. Ltd\"},\"image\":{\"@id\":\"https:\/\/www.pentagon.co.in\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/services42257\",\"https:\/\/www.youtube.com\/@PentagonSystemServices\",\"https:\/\/www.linkedin.com\/company\/pentagon-system-and-services\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pentagon.co.in\/#\/schema\/person\/3d20424663f9e7883693c846fe072a11\",\"name\":\"Jeet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pentagon.co.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0edd20e1103029e84d9b930277627313a02a4e4ea8def89392efb2a7c58711af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0edd20e1103029e84d9b930277627313a02a4e4ea8def89392efb2a7c58711af?s=96&d=mm&r=g\",\"caption\":\"Jeet\"},\"url\":\"https:\/\/www.pentagon.co.in\/index.php\/author\/innovationsbeyond\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS - Pentagon System &amp; Services Pvt. Ltd","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/","og_locale":"en_US","og_type":"article","og_title":"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS - Pentagon System &amp; Services Pvt. Ltd","og_description":"[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;1&#8243; bottom_padding=&#8221;1&#8243; back_image=&#8221;160139&#8243; back_attachment=&#8221;fixed&#8221; back_position=&#8221;center center&#8221; overlay_color=&#8221;color-105898&#8243; overlay_alpha=&#8221;40&#8243; overlay_animated=&#8221;yes&#8221; overlay_animated_1_color=&#8221;color-144745&#8243; overlay_animated_2_color=&#8221;color-434631&#8243; overlay_animated_speed=&#8221;1500&#8243; overlay_animated_size=&#8221;0.35&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; [&hellip;]","og_url":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/","og_site_name":"Pentagon System &amp; Services Pvt. Ltd","article_published_time":"2025-09-19T09:46:02+00:00","article_modified_time":"2025-12-18T10:26:06+00:00","og_image":[{"width":1280,"height":800,"url":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png","type":"image\/png"}],"author":"Jeet","twitter_card":"summary_large_image","twitter_creator":"@services42257","twitter_site":"@services42257","twitter_misc":{"Written by":"Jeet","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#article","isPartOf":{"@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/"},"author":{"name":"Jeet","@id":"https:\/\/www.pentagon.co.in\/#\/schema\/person\/3d20424663f9e7883693c846fe072a11"},"headline":"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS","datePublished":"2025-09-19T09:46:02+00:00","dateModified":"2025-12-18T10:26:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/"},"wordCount":708,"publisher":{"@id":"https:\/\/www.pentagon.co.in\/#organization"},"image":{"@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png","articleSection":["Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/","url":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/","name":"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS - Pentagon System &amp; Services Pvt. Ltd","isPartOf":{"@id":"https:\/\/www.pentagon.co.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage"},"image":{"@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png","datePublished":"2025-09-19T09:46:02+00:00","dateModified":"2025-12-18T10:26:06+00:00","breadcrumb":{"@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#primaryimage","url":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png","contentUrl":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/09\/Gemini_Generated_Image_ablhjablhjablhja.png","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.pentagon.co.in\/index.php\/blogs\/key-measures-to-be-taken-for-enforcing-security-controls-for-asp-net-workloads-hosted-on-aws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pentagon.co.in\/"},{"@type":"ListItem","position":2,"name":"Key measures to be taken for enforcing security controls for ASP.NET workloads hosted on AWS"}]},{"@type":"WebSite","@id":"https:\/\/www.pentagon.co.in\/#website","url":"https:\/\/www.pentagon.co.in\/","name":"Pentagon System & Services Pvt. Ltd","description":"Get IT Solved","publisher":{"@id":"https:\/\/www.pentagon.co.in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pentagon.co.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pentagon.co.in\/#organization","name":"Pentagon System & Services Pvt. Ltd","url":"https:\/\/www.pentagon.co.in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentagon.co.in\/#\/schema\/logo\/image\/","url":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/07\/Pentagon_Final-Logo_270625.png","contentUrl":"https:\/\/www.pentagon.co.in\/wp-content\/uploads\/2025\/07\/Pentagon_Final-Logo_270625.png","width":1326,"height":383,"caption":"Pentagon System & Services Pvt. Ltd"},"image":{"@id":"https:\/\/www.pentagon.co.in\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/services42257","https:\/\/www.youtube.com\/@PentagonSystemServices","https:\/\/www.linkedin.com\/company\/pentagon-system-and-services\/"]},{"@type":"Person","@id":"https:\/\/www.pentagon.co.in\/#\/schema\/person\/3d20424663f9e7883693c846fe072a11","name":"Jeet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pentagon.co.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0edd20e1103029e84d9b930277627313a02a4e4ea8def89392efb2a7c58711af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0edd20e1103029e84d9b930277627313a02a4e4ea8def89392efb2a7c58711af?s=96&d=mm&r=g","caption":"Jeet"},"url":"https:\/\/www.pentagon.co.in\/index.php\/author\/innovationsbeyond\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/posts\/160134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=160134"}],"version-history":[{"count":3,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/posts\/160134\/revisions"}],"predecessor-version":[{"id":160147,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/posts\/160134\/revisions\/160147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/media\/160139"}],"wp:attachment":[{"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=160134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=160134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pentagon.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=160134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}