Make Least Privilege Easier in AWS
Five approaches to making IAM Least Privilege easier within your AWS environments.
Role Shopping: Embrace Your Tags
Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Shifting Application Security to the Left
Automate and simplify your application security process by shifting it to the left.
Security Best Practices for Amazon Elasticsearch - Part One
Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Rightsize Your IAM Policies
Quickly reduce your attack surface by securing your IAM policies.
AWS Control Tower Guardrail Alignment
Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
IAM Patterns
First steps for a successful IAM implementation.
Getting Started with TDD in AWS
TDD can improve your security posture in AWS.
Inventory Your GCP API Keys
Inventory, analyze, and report on your GCP API keys in an automated fashion.
5 Things You Should Be Doing in IAM Right Now
Identity and Access Management is critical to get right, here are 5 things you should be ...