Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Roy Kalamaro5 min read

AWS Control Tower Guardrail Alignment

Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
Start Reading
Aaron Rea4 min read

IAM Patterns

First steps for a successful IAM implementation.
Start Reading
ScaleSec8 min read

Getting Started with TDD in AWS

TDD can improve your security posture in AWS.
Start Reading
Jason Dyke7 min read

Inventory Your GCP API Keys

Inventory, analyze, and report on your GCP API keys in an automated fashion.
Start Reading
Sarah Gori8 min read

5 Things You Should Be Doing in IAM Right Now

Identity and Access Management is critical to get right, here are 5 things you should be ...
Start Reading
Anthony DiMarco6 min read

Security Best Practices for Serverless Applications on AWS

First in our Modernizing Security: AWS Series of posts that cover best practices for ...
Start Reading
ScaleSec1 min read

ScaleSec announces: Modernizing Security, an AWS series

The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
Start Reading
Eric Evans14 min read

A Comparison of Secrets Managers for GCP

There are many options to manage your secrets in the cloud. We examine 3 of the most ...
Start Reading
Chris Leibl6 min read

Google Cloud Platform — Service Account Key Usage Visibility

In this article, we will cover a newly released feature in GCP which can provide Security ...
Start Reading
Scott McDonald9 min read

OpenVPN Integration with GSuite

ScaleSec is working from home during the COVID-19 pandemic. To help our employees ...
Start Reading