Blog Post by ScaleSec
ScaleSec6 min read
Using AWS CloudFront and WAF with Serverless Applications
AWS CloudFront and WAF are great extensions for your serverless stack. Here are some best ...
Start Reading
ScaleSec7 min read
Your Guide to Google Cloud Function Identities
Trying to scope your Google Cloud Functions effectively? Here’s what you should know ...
Start Reading
ScaleSec9 min read
Best Practices for AWS Serverless Endpoint Security
Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec4 min read
Cloudknocking
Using Cloud Native Services to Obfuscate Command and Control.
Start Reading
ScaleSec6 min read
Security Best Practices for Amazon Elasticsearch - Part Two
Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec7 min read
Role Shopping: Embrace Your Tags
Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
ScaleSec9 min read
Security Best Practices for Amazon Elasticsearch - Part One
Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read
Rightsize Your IAM Policies
Quickly reduce your attack surface by securing your IAM policies.
Start Reading
ScaleSec8 min read
Getting Started with TDD in AWS
TDD can improve your security posture in AWS.
Start Reading
ScaleSec1 min read
ScaleSec announces: Modernizing Security, an AWS series
The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
Start Reading