AWS Control Tower Guardrail Alignment
Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
IAM Patterns
First steps for a successful IAM implementation.
Getting Started with TDD in AWS
TDD can improve your security posture in AWS.
Inventory Your GCP API Keys
Inventory, analyze, and report on your GCP API keys in an automated fashion.
5 Things You Should Be Doing in IAM Right Now
Identity and Access Management is critical to get right, here are 5 things you should be ...
Security Best Practices for Serverless Applications on AWS
First in our Modernizing Security: AWS Series of posts that cover best practices for ...
ScaleSec announces: Modernizing Security, an AWS series
The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
A Comparison of Secrets Managers for GCP
There are many options to manage your secrets in the cloud. We examine 3 of the most ...
Google Cloud Platform — Service Account Key Usage Visibility
In this article, we will cover a newly released feature in GCP which can provide Security ...
OpenVPN Integration with GSuite
ScaleSec is working from home during the COVID-19 pandemic. To help our employees ...