Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

ScaleSec9 min read

Security Best Practices for Amazon Elasticsearch - Part One

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read

Rightsize Your IAM Policies

Quickly reduce your attack surface by securing your IAM policies.
Start Reading
Roy Kalamaro5 min read

AWS Control Tower Guardrail Alignment

Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
Start Reading
ScaleSec8 min read

Getting Started with TDD in AWS

TDD can improve your security posture in AWS.
Start Reading
Sarah Gori8 min read

5 Things You Should Be Doing in IAM Right Now

Identity and Access Management is critical to get right, here are 5 things you should be ...
Start Reading
Anthony DiMarco6 min read

Security Best Practices for Serverless Applications on AWS

First in our Modernizing Security: AWS Series of posts that cover best practices for ...
Start Reading
ScaleSec1 min read

ScaleSec announces: Modernizing Security, an AWS series

The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
Start Reading
Eric Evans14 min read

A Comparison of Secrets Managers for GCP

There are many options to manage your secrets in the cloud. We examine 3 of the most ...
Start Reading
Chris Leibl6 min read

Google Cloud Platform — Service Account Key Usage Visibility

In this article, we will cover a newly released feature in GCP which can provide Security ...
Start Reading
Jason Dyke8 min read

Our Favorite AWS re:Invent Security Announcements

In this blog you will find a brief rundown of our favorite security announcements from ...
Start Reading