Skip to content
Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

ScaleSec9 min read

Best Practices for AWS Serverless Endpoint Security

Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec4 min read

Cloudknocking

Using Cloud Native Services to Obfuscate Command and Control.
Start Reading
ScaleSec6 min read

Security Best Practices for Amazon Elasticsearch - Part Two

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
Dustin Whited10 min read

Analyzing IAM Policies at Scale with Parliament

Automating the IAM Policy review process with Python.
Start Reading
ScaleSec7 min read

Role Shopping: Embrace Your Tags

Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
ScaleSec9 min read

Security Best Practices for Amazon Elasticsearch - Part One

Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read

Rightsize Your IAM Policies

Quickly reduce your attack surface by securing your IAM policies.
Start Reading
Roy Kalamaro5 min read

AWS Control Tower Guardrail Alignment

Aligning AWS Control Tower Security Guardrails with AWS Well-Architected Framework ...
Start Reading
ScaleSec8 min read

Getting Started with TDD in AWS

TDD can improve your security posture in AWS.
Start Reading
Sarah Gori8 min read

5 Things You Should Be Doing in IAM Right Now

Identity and Access Management is critical to get right, here are 5 things you should be ...
Start Reading