Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Roy Kalamaro5 min read

AWS Control Tower Guardrail Alignment

Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
Start Reading
Aaron Rea4 min read

IAM Patterns

First steps for a successful IAM implementation.
Start Reading
ScaleSec8 min read

Getting Started with TDD in AWS

TDD can improve your security posture in AWS.
Start Reading
Jason Dyke7 min read

Inventory Your GCP API Keys

Inventory, analyze, and report on your GCP API keys in an automated fashion.
Start Reading
Eric Evans14 min read

A Comparison of Secrets Managers for GCP

There are many options to manage your secrets in the cloud. We examine 3 of the most ...
Start Reading
Jason Dyke9 min read

Automate Security on GCP with Event Threat Detection

Leverage GCP Cloud Functions and Event Threat Detection to automate your cloud security ...
Start Reading
Eric Evans11 min read

GCP Secret Manager - First Look

With so many options to manage your secrets in the cloud, the decision on how to handle ...
Start Reading
Eric Evans10 min read

Well-Architected Infrastructure on AWS Using Pulumi Crosswalk and TypeScript

Using Infrastructure as Code (IaC) to define your infrastructure helps to avoid ...
Start Reading
Eric Evans2 min read

Create a Serverless AWS EKS Cluster using Pulumi

This week at AWS Re:Invent 2019, Fargate support for the Elastic Kubernetes Service (EKS) ...
Start Reading
Eric Evans14 min read

A Comparison of Secrets Managers for AWS

There are many options to manage your secrets in the cloud. We examine 3 of the most ...
Start Reading