Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Dustin Whited10 min read

Analyzing IAM Policies at Scale with Parliament

Automating the IAM Policy review process with Python.
Start Reading
ScaleSec7 min read

Role Shopping: Embrace Your Tags

Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
Anthony DiMarco7 min read

Shifting Application Security to the Left

Automate and simplify your application security process by shifting it to the left.
Start Reading
ScaleSec9 min read

Security Best Practices for Amazon Elasticsearch - Part One

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read

Rightsize Your IAM Policies

Quickly reduce your attack surface by securing your IAM policies.
Start Reading
Roy Kalamaro5 min read

AWS Control Tower Guardrail Alignment

Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
Start Reading
ScaleSec8 min read

Getting Started with TDD in AWS

TDD can improve your security posture in AWS.
Start Reading
Sarah Gori8 min read

5 Things You Should Be Doing in IAM Right Now

Identity and Access Management is critical to get right, here are 5 things you should be ...
Start Reading
Anthony DiMarco6 min read

Security Best Practices for Serverless Applications on AWS

First in our Modernizing Security: AWS Series of posts that cover best practices for ...
Start Reading
ScaleSec1 min read

ScaleSec announces: Modernizing Security, an AWS series

The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
Start Reading