DEV Community

# cloudsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Automatic source locations with Rego

Automatic source locations with Rego

1
Comments
10 min read
Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
When Automation Meets Authentication

When Automation Meets Authentication

1
Comments 1
5 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
How to run an AWS CIS v3.0 assessment in CloudShell

How to run an AWS CIS v3.0 assessment in CloudShell

6
Comments
2 min read
Start building my AWS Clean Rooms lab

Start building my AWS Clean Rooms lab

2
Comments
3 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

8
Comments 2
17 min read
First Try on AWS Security Hub Central Configuration

First Try on AWS Security Hub Central Configuration

1
Comments
7 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

5
Comments
17 min read
Understanding AWS Instance Metadata Service: A Closer Look

Understanding AWS Instance Metadata Service: A Closer Look

2
Comments
8 min read
Can We Use aws:SourceVpc Condition Without a VPC Endpoint?

Can We Use aws:SourceVpc Condition Without a VPC Endpoint?

4
Comments
7 min read
Social Engineering Attacks - Prevention and Best Practices

Social Engineering Attacks - Prevention and Best Practices

1
Comments
4 min read
What is Security and the AWS Shared Responsibility Model

What is Security and the AWS Shared Responsibility Model

Comments
2 min read
A playground to practice differential privacy - Antigranular

A playground to practice differential privacy - Antigranular

Comments
6 min read
Azure Cloud & Container Security Best Practices

Azure Cloud & Container Security Best Practices

1
Comments
10 min read
Enhancing code to cloud security with the Common Configuration Scoring System

Enhancing code to cloud security with the Common Configuration Scoring System

5
Comments
5 min read
My thoughts on AWS re:Invent 2023 announcements

My thoughts on AWS re:Invent 2023 announcements

4
Comments
6 min read
Rego for beginners: Introduction to Rego

Rego for beginners: Introduction to Rego

Comments
10 min read
Securing AWS Environments Against Ransomware

Securing AWS Environments Against Ransomware

8
Comments
3 min read
Rego for beginners Part 2: Combining queries with AND/OR and custom messages

Rego for beginners Part 2: Combining queries with AND/OR and custom messages

Comments
10 min read
Rego 103: Types of values and rules

Rego 103: Types of values and rules

5
Comments
13 min read
Essential AWS IAM Enumeration Commands

Essential AWS IAM Enumeration Commands

2
Comments
6 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

10
Comments
7 min read
Implementing TLS in Kubernetes

Implementing TLS in Kubernetes

3
Comments
9 min read
Attack Path Analysis: What It Is and Why You Should Care

Attack Path Analysis: What It Is and Why You Should Care

2
Comments
5 min read
Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

4
Comments
6 min read
Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization

Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization

5
Comments 1
6 min read
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Comments
4 min read
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

3
Comments
3 min read
Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

1
Comments
4 min read
Mapping your AWS attack surface

Mapping your AWS attack surface

8
Comments
6 min read
Cloud security fundamentals part 5: measure what matters

Cloud security fundamentals part 5: measure what matters

Comments
4 min read
Cloud security fundamentals part 4: Align and automate with policy as code

Cloud security fundamentals part 4: Align and automate with policy as code

Comments
4 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

2
Comments
6 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

5
Comments
9 min read
Cloud security fundamentals part 3: Empower your developers

Cloud security fundamentals part 3: Empower your developers

Comments
5 min read
Cloud security fundamentals part 2: Prevention and secure design

Cloud security fundamentals part 2: Prevention and secure design

Comments
5 min read
Can't miss Security Sessions at re:Invent 2022

Can't miss Security Sessions at re:Invent 2022

6
Comments
13 min read
Cloud security fundamentals part 1: Know your environment

Cloud security fundamentals part 1: Know your environment

Comments
5 min read
Why developers hold the key to cloud security

Why developers hold the key to cloud security

Comments
6 min read
Announcing the 2022 State of Cloud Security report from Snyk

Announcing the 2022 State of Cloud Security report from Snyk

Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

4
Comments
4 min read
How to perform a security audit of your AWS account in AWS CloudShell

How to perform a security audit of your AWS account in AWS CloudShell

27
Comments 3
3 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Soft Deleted Blobs

Soft Deleted Blobs

4
Comments
3 min read
Extracting credentials from App Service

Extracting credentials from App Service

5
Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

3
Comments
2 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

5
Comments
2 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

6
Comments
2 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

5
Comments
2 min read
Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

3
Comments
5 min read
Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

2
Comments
11 min read
Enforcing Image Trust on Docker Containers using Notary

Enforcing Image Trust on Docker Containers using Notary

4
Comments
6 min read
Starting your Cloud Security Journey

Starting your Cloud Security Journey

4
Comments
6 min read
Five Common Cloud Security Threats and Data Breaches

Five Common Cloud Security Threats and Data Breaches

21
Comments 4
8 min read
loading...