Skip to content
Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec

avatar
ScaleSec Editor Account

Blog Post by ScaleSec

ScaleSec7 min read

Your Guide to Google Cloud Function Identities

Trying to scope your Google Cloud Functions effectively? Here’s what you should know ...
Start Reading
ScaleSec9 min read

Best Practices for AWS Serverless Endpoint Security

Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec4 min read

Cloudknocking

Using Cloud Native Services to Obfuscate Command and Control.
Start Reading
ScaleSec6 min read

Security Best Practices for Amazon Elasticsearch - Part Two

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec7 min read

Role Shopping: Embrace Your Tags

Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
ScaleSec9 min read

Security Best Practices for Amazon Elasticsearch - Part One

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read

Rightsize Your IAM Policies

Quickly reduce your attack surface by securing your IAM policies.
Start Reading
ScaleSec8 min read

Getting Started with TDD in AWS

TDD can improve your security posture in AWS.
Start Reading
ScaleSec1 min read

ScaleSec announces: Modernizing Security, an AWS series

The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
Start Reading
ScaleSec7 min read

Giving Thanks and Ringing in the New Year at ScaleSec

This year was a big one for ScaleSec, as we made strides in our competencies, cemented ...
Start Reading