Intricacies of IAM Conditions
Exploring the intricacies of using IAM Conditions in Google Cloud.
Why Your YubiKey Won’t Work With AWS CLI (and the fix)
Set up a YubiKey as two-factor authentication in AWS that will work with the Console, ...
AWS Log Blog
Knowing the various AWS log types and the information they provide is the first step to ...
Best Practices for AWS Serverless Endpoint Security
Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Cloudknocking
Using Cloud Native Services to Obfuscate Command and Control.
Data Loss Prevention on Google Cloud
How to use Cloud DLP to secure batch and streaming data.
Security Best Practices for Amazon Elasticsearch - Part Two
Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Analyzing IAM Policies at Scale with Parliament
Automating the IAM Policy review process with Python.
Make Least Privilege Easier in AWS
Five approaches to making IAM Least Privilege easier within your AWS environments.
Role Shopping: Embrace Your Tags
Role shopping and permissions creep undermines least privilege, here we discuss how to ...