Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

John Porter5 min read

End Security Debt with AWS Security Hub

Pay down security debt by configuring, controlling, and monitoring your AWS accounts with ...
Start Reading
Anthony DiMarco5 min read

Using WAF and CloudFront with Serverless Applications

The third installment of security best practices for serverless applications running on ...
Start Reading
Ron Sivonda2 min read

Breaking Barriers to Market Entrance with Compliance

Building your product with market-specific compliance frameworks in mind can save you ...
Start Reading
Allison DiPietro7 min read

CCPA - What You Can (and Should) Do Right Now

With CCPA in full effect, what can companies do to prepare?
Start Reading
John Porter7 min read

Why Your YubiKey Won’t Work With AWS CLI (and the fix)

Set up a YubiKey as two-factor authentication in AWS that will work with the Console, ...
Start Reading
ScaleSec9 min read

Best Practices for AWS Serverless Endpoint Security

Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec6 min read

Security Best Practices for Amazon Elasticsearch - Part Two

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
Dustin Whited10 min read

Analyzing IAM Policies at Scale with Parliament

Automating the IAM Policy review process with Python.
Start Reading
ScaleSec7 min read

Role Shopping: Embrace Your Tags

Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
Anthony DiMarco7 min read

Shifting Application Security to the Left

Automate and simplify your application security process by shifting it to the left.
Start Reading