Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Allison DiPietro4 min read

Cybersecurity Executive Order: a tl;dr

What the White House’s Executive Order on Cybersecurity means for software companies, and ...
Start Reading
Mike Fuller13 min read

SecOps Automation

Automating Security Operations in AWS by improving CIS Benchmark Alerts with EventBridge
Start Reading
Eric Evans8 min read

Cloud-First API Security

APIs can be secured using AWS and GCP cloud native technologies and architectures.
Start Reading
Anthony DiMarco7 min read

Practical Attribute-Based Access Control with AWS

An explanation of attribute-based access control (ABAC) and some practical examples of ...
Start Reading
Aaron Rea5 min read

Tips for a Successful Cloud Security Consulting Engagement

Lessons and heuristics from successful consulting engagements.
Start Reading
Steven Adegbenle7 min read

Creating A GitHub App to Validate IAM Policies

Continuous IAM Policy Feedback with GitHub Apps.
Start Reading
Michael Flanigan2 min read

Engagement Guardrails

How to navigate around potential engagement speedbumps.
Start Reading
Jason Dyke9 min read

Access GCP from AWS using Workload Identity Federation

Workload Identity federation allows cloud users to access GCP resources from AWS without ...
Start Reading
Jason Dyke4 min read

Identify Unused Service Accounts in GCP

Easily find and identify unused service accounts across your entire GCP organization.
Start Reading
Julianna DiPrima4 min read

Staying on the Cutting Edge of Cloud

A main ingredient to ScaleSec’s Cloud Security expertise is its investment in continued ...
Start Reading