Practical Attribute-Based Access Control with AWS
An explanation of attribute-based access control (ABAC) and some practical examples of ...
Tips for a Successful Cloud Security Consulting Engagement
Lessons and heuristics from successful consulting engagements.
Creating A GitHub App to Validate IAM Policies
Continuous IAM Policy Feedback with GitHub Apps.
Engagement Guardrails
How to navigate around potential engagement speedbumps.
Access GCP from AWS using Workload Identity Federation
Workload Identity federation allows cloud users to access GCP resources from AWS without ...
Identify Unused Service Accounts in GCP
Easily find and identify unused service accounts across your entire GCP organization.
Staying on the Cutting Edge of Cloud
A main ingredient to ScaleSec’s Cloud Security expertise is its investment in continued ...
A Guide to Securing Google Kubernetes Engine
This guide helps you secure Google Kubernetes Engine (GKE).
Be Present Today
Taking the time to be present every day can help break through the monotony of staying ...
Customization and Automation in AWS Audit Manager
Customizing AWS Audit Manager Frameworks with the AWS CLI and API.