Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Dennis Chow16 min read

Refactoring by Example for Security Engineers

Learn how to refactor a stand alone threat detection bash script to a container and ...
Start Reading
Nick Selpa13 min read

A Layperson's Guide to GCP Network Firewalling

GCP Network Firewall companion for cloud professionals interested in a well-rounded ...
Start Reading
Jack Ryan9 min read

Understanding AWS Service Control Policies

An introduction to AWS Service Control Policies, their application, and the simple, ...
Start Reading
Steven Smiley5 min read

Highlights from AWS re:Inforce 2022

Highlights from AWS security conference, 2022.
Start Reading
Dennis Chow7 min read

Exploit SSRF to gain AWS Credentials

Learn how Server Side Request Forgeries (SSRF) can abuse the default AWS instance ...
Start Reading
Anthony DiMarco7 min read

Identity Federation for GitHub Actions on AWS

Securing access to AWS resources for GitHub Actions workflows with OpenID Connect ...
Start Reading
Sarah Gori9 min read

Zero Trust in the Cloud

What is Zero Trust and how does it work in the Cloud?
Start Reading
Cody Bench4 min read

Automating AWS IAM Remediation in Python

Tips and challenges of automating AWS IAM remediation in Python to help developers to ...
Start Reading
Cameron McCloud6 min read

Google Cloud Security Summit 2022 Highlights

Summary of some notable sessions at the annual Google Cloud Security Summit 2022 ...
Start Reading
Dennis Chow7 min read

Implementing Secure Code in the Cloud

Learn how to implement security in the cloud at the application layer.
Start Reading