Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

ScaleSec9 min read

How to Build an Effective & Safe Cloud Migration Strategy

Cloud migration can be a transformative move for your business — but only if you approach ...
Start Reading
Zach Beeler5 min read

Unlocking the Benefits of a Data Perimeter in AWS

Organizations can unlock cloud security benefits by establishing an AWS data perimeter.
Start Reading
Aaron Rea6 min read

AWS re:Invent 2022 Security Recap

A recap of security related announcements at re:Invent 2022.
Start Reading
Steven Smiley4 min read

6 Keys to Securing User Uploads to Amazon S3

Architecting AWS applications to securely enable user uploaded content, using pre-signed ...
Start Reading
Jack Ryan9 min read

Understanding AWS Service Control Policies

An introduction to AWS Service Control Policies, their application, and the simple, ...
Start Reading
Steven Smiley5 min read

Highlights from AWS re:Inforce 2022

Highlights from AWS security conference, 2022.
Start Reading
Dennis Chow7 min read

Exploit SSRF to gain AWS Credentials

Learn how Server Side Request Forgeries (SSRF) can abuse the default AWS instance ...
Start Reading
Anthony DiMarco7 min read

Identity Federation for GitHub Actions on AWS

Securing access to AWS resources for GitHub Actions workflows with OpenID Connect ...
Start Reading
Sarah Gori9 min read

Zero Trust in the Cloud

What is Zero Trust and how does it work in the Cloud?
Start Reading
Dennis Chow7 min read

Implementing Secure Code in the Cloud

Learn how to implement security in the cloud at the application layer.
Start Reading