Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

ScaleSec9 min read

Best Practices for AWS Serverless Endpoint Security

Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec4 min read

Cloudknocking

Using Cloud Native Services to Obfuscate Command and Control.
Start Reading
Eric Evans5 min read

Data Loss Prevention on Google Cloud

How to use Cloud DLP to secure batch and streaming data.
Start Reading
ScaleSec6 min read

Security Best Practices for Amazon Elasticsearch - Part Two

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
Dustin Whited10 min read

Analyzing IAM Policies at Scale with Parliament

Automating the IAM Policy review process with Python.
Start Reading
Steven Adegbenle5 min read

Make Least Privilege Easier in AWS

Five approaches to making IAM Least Privilege easier within your AWS environments.
Start Reading
ScaleSec7 min read

Role Shopping: Embrace Your Tags

Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
Anthony DiMarco7 min read

Shifting Application Security to the Left

Automate and simplify your application security process by shifting it to the left.
Start Reading
ScaleSec9 min read

Security Best Practices for Amazon Elasticsearch - Part One

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read

Rightsize Your IAM Policies

Quickly reduce your attack surface by securing your IAM policies.
Start Reading