Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Chris Leibl7 min read

Intricacies of IAM Conditions

Exploring the intricacies of using IAM Conditions in Google Cloud.
Start Reading
John Porter7 min read

Why Your YubiKey Won’t Work With AWS CLI (and the fix)

Set up a YubiKey as two-factor authentication in AWS that will work with the Console, ...
Start Reading
Dustin Whited7 min read

AWS Log Blog

Knowing the various AWS log types and the information they provide is the first step to ...
Start Reading
ScaleSec9 min read

Best Practices for AWS Serverless Endpoint Security

Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec4 min read

Cloudknocking

Using Cloud Native Services to Obfuscate Command and Control.
Start Reading
Eric Evans5 min read

Data Loss Prevention on Google Cloud

How to use Cloud DLP to secure batch and streaming data.
Start Reading
ScaleSec6 min read

Security Best Practices for Amazon Elasticsearch - Part Two

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
Dustin Whited10 min read

Analyzing IAM Policies at Scale with Parliament

Automating the IAM Policy review process with Python.
Start Reading
Steven Adegbenle5 min read

Make Least Privilege Easier in AWS

Five approaches to making IAM Least Privilege easier within your AWS environments.
Start Reading
ScaleSec7 min read

Role Shopping: Embrace Your Tags

Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading