Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
cloudsecurity
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Issue 36 of AWS Cloud Security Weekly
AJ
AJ
AJ
Follow
Mar 18
Issue 36 of AWS Cloud Security Weekly
#
cloudsecurity
#
newsletter
#
aws
#
cybersecurity
Comments
Add Comment
2 min read
Automatic source locations with Rego
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Feb 13
Automatic source locations with Rego
#
cloudsecurity
#
rego
#
opa
1
reaction
Comments
Add Comment
10 min read
Issue 35 of AWS Cloud Security Weekly
AJ
AJ
AJ
Follow
for
AWS Community Builders
Mar 11
Issue 35 of AWS Cloud Security Weekly
#
cloudsecurity
#
cybersecurity
#
newsletter
#
aws
2
reactions
Comments
Add Comment
2 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management
David Melamed
David Melamed
David Melamed
Follow
for
AWS Community Builders
Feb 21
A Deep Dive into OCSF & VEX - Unified Standards for Security Management
#
aws
#
security
#
devsecops
#
cloudsecurity
6
reactions
Comments
Add Comment
6 min read
When Automation Meets Authentication
Richard Fan
Richard Fan
Richard Fan
Follow
Feb 6
When Automation Meets Authentication
#
gitops
#
cloudsecurity
#
devops
1
reaction
Comments
1
comment
5 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration
Cdx_Abhiram
Cdx_Abhiram
Cdx_Abhiram
Follow
Feb 1
Bridging the Cloud Security Gap: From Innovation to Operational Integration
#
cloudnative
#
cloudskills
#
cloudsecurity
#
cybersecurity
Comments
Add Comment
2 min read
How to run an AWS CIS v3.0 assessment in CloudShell
bob-bot
bob-bot
bob-bot
Follow
for
AWS Community Builders
Feb 8
How to run an AWS CIS v3.0 assessment in CloudShell
#
turbot
#
steampipe
#
aws
#
cloudsecurity
6
reactions
Comments
Add Comment
2 min read
Start building my AWS Clean Rooms lab
Richard Fan
Richard Fan
Richard Fan
Follow
for
AWS Community Builders
Jan 2
Start building my AWS Clean Rooms lab
#
cloudsecurity
#
dataprivacy
#
privacyenhancingtechnologies
#
aws
2
reactions
Comments
Add Comment
3 min read
Comprehensive re:Cap security practice on AWS
Danny Chan
Danny Chan
Danny Chan
Follow
for
AWS Community Builders
Jan 28
Comprehensive re:Cap security practice on AWS
#
security
#
awssecurity
#
aws
#
cloudsecurity
8
reactions
Comments
2
comments
17 min read
First Try on AWS Security Hub Central Configuration
Richard Fan
Richard Fan
Richard Fan
Follow
for
AWS Community Builders
Dec 26 '23
First Try on AWS Security Hub Central Configuration
#
aws
#
cloudsecurity
#
securityhub
1
reaction
Comments
Add Comment
7 min read
Comprehensive re:Cap security practice on AWS
Danny Chan
Danny Chan
Danny Chan
Follow
Jan 24
Comprehensive re:Cap security practice on AWS
#
security
#
awssecurity
#
aws
#
cloudsecurity
5
reactions
Comments
Add Comment
17 min read
Understanding AWS Instance Metadata Service: A Closer Look
Rimpal Johal
Rimpal Johal
Rimpal Johal
Follow
for
AWS Community Builders
Jan 21
Understanding AWS Instance Metadata Service: A Closer Look
#
security
#
aws
#
cloudsecurity
#
cloud
2
reactions
Comments
Add Comment
8 min read
Can We Use aws:SourceVpc Condition Without a VPC Endpoint?
Richard Fan
Richard Fan
Richard Fan
Follow
for
AWS Community Builders
Jan 18
Can We Use aws:SourceVpc Condition Without a VPC Endpoint?
#
aws
#
iam
#
vpc
#
cloudsecurity
4
reactions
Comments
Add Comment
7 min read
Social Engineering Attacks - Prevention and Best Practices
AiCyberWatch
AiCyberWatch
AiCyberWatch
Follow
Dec 18 '23
Social Engineering Attacks - Prevention and Best Practices
#
cybersecurity
#
socialengineering
#
cyberattacks
#
cloudsecurity
1
reaction
Comments
Add Comment
4 min read
What is Security and the AWS Shared Responsibility Model
Manohar Vishwakarma
Manohar Vishwakarma
Manohar Vishwakarma
Follow
Nov 29 '23
What is Security and the AWS Shared Responsibility Model
#
aws
#
security
#
cloudsecurity
#
vpc
Comments
Add Comment
2 min read
A playground to practice differential privacy - Antigranular
Richard Fan
Richard Fan
Richard Fan
Follow
Dec 26 '23
A playground to practice differential privacy - Antigranular
#
cloudsecurity
#
dataprivacy
#
dataprotection
Comments
Add Comment
6 min read
Azure Cloud & Container Security Best Practices
Syed Nashet Ali
Syed Nashet Ali
Syed Nashet Ali
Follow
Nov 26 '23
Azure Cloud & Container Security Best Practices
#
webdev
#
cloudsecurity
#
azure
#
cybersecurity
1
reaction
Comments
Add Comment
10 min read
Enhancing code to cloud security with the Common Configuration Scoring System
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Dec 16 '23
Enhancing code to cloud security with the Common Configuration Scoring System
#
applicationsecurity
#
codesecurity
#
cloudsecurity
#
aspm
5
reactions
Comments
Add Comment
5 min read
My thoughts on AWS re:Invent 2023 announcements
Richard Fan
Richard Fan
Richard Fan
Follow
for
AWS Community Builders
Dec 7 '23
My thoughts on AWS re:Invent 2023 announcements
#
aws
#
awsreinvent
#
cloudsecurity
4
reactions
Comments
Add Comment
6 min read
Rego for beginners: Introduction to Rego
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 3 '23
Rego for beginners: Introduction to Rego
#
cloudsecurity
#
iacsecurity
#
rego
#
opa
Comments
Add Comment
10 min read
Securing AWS Environments Against Ransomware
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Nov 23 '23
Securing AWS Environments Against Ransomware
#
awssecurity
#
ransomware
#
infosec
#
cloudsecurity
8
reactions
Comments
Add Comment
3 min read
Rego for beginners Part 2: Combining queries with AND/OR and custom messages
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 10 '23
Rego for beginners Part 2: Combining queries with AND/OR and custom messages
#
iacsecurity
#
cloudsecurity
#
rego
#
opa
Comments
Add Comment
10 min read
Rego 103: Types of values and rules
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 17 '23
Rego 103: Types of values and rules
#
iacsecurity
#
cloudsecurity
#
rego
#
opa
5
reactions
Comments
Add Comment
13 min read
Essential AWS IAM Enumeration Commands
Afshan Naqvi
Afshan Naqvi
Afshan Naqvi
Follow
Oct 31 '23
Essential AWS IAM Enumeration Commands
#
cloudsecurity
#
aws
#
cli
#
security
2
reactions
Comments
Add Comment
6 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets
Brandon Damue
Brandon Damue
Brandon Damue
Follow
Aug 7 '23
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets
#
aws
#
cloudsecurity
#
encryption
#
cloudcomputing
10
reactions
Comments
Add Comment
7 min read
Implementing TLS in Kubernetes
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Aug 1 '23
Implementing TLS in Kubernetes
#
cloudsecurity
#
containersecurity
#
kubernetes
3
reactions
Comments
Add Comment
9 min read
Attack Path Analysis: What It Is and Why You Should Care
Brianna Blacet
Brianna Blacet
Brianna Blacet
Follow
for
Outshift By Cisco
Jun 28 '23
Attack Path Analysis: What It Is and Why You Should Care
#
attackpath
#
attackpathanalysis
#
cybersecurity
#
cloudsecurity
2
reactions
Comments
Add Comment
5 min read
Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?
Sheyla Leacock
Sheyla Leacock
Sheyla Leacock
Follow
for
AWS Community Builders
Jun 13 '23
Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?
#
aws
#
cloudsecurity
#
cloud
#
cybersecurity
4
reactions
Comments
Add Comment
6 min read
Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization
sivatharsan
sivatharsan
sivatharsan
Follow
Apr 17 '23
Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization
#
cloudsecurity
#
cloudgovernace
#
cloudcustodian
#
aws
5
reactions
Comments
1
comment
6 min read
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Apr 11 '23
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.
#
aws
#
infosec
#
cloudnative
#
cloudsecurity
Comments
Add Comment
4 min read
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage
Amruta Pardeshi
Amruta Pardeshi
Amruta Pardeshi
Follow
Mar 24 '23
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage
#
aws
#
cloudsecurity
#
devops
#
security
3
reactions
Comments
Add Comment
3 min read
Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform
Wilklins Nyatteng
Wilklins Nyatteng
Wilklins Nyatteng
Follow
for
AWS Community Builders
Mar 15 '23
Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform
#
aws
#
terraform
#
cloudsecurity
#
productivity
1
reaction
Comments
Add Comment
4 min read
Mapping your AWS attack surface
Chris Farris
Chris Farris
Chris Farris
Follow
for
AWS Community Builders
Dec 27 '22
Mapping your AWS attack surface
#
sql
#
cloudsecurity
#
opensource
#
aws
8
reactions
Comments
Add Comment
6 min read
Cloud security fundamentals part 5: measure what matters
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Cloud security fundamentals part 5: measure what matters
#
cloudnativesecurity
#
cloud
#
cloudsecurity
Comments
Add Comment
4 min read
Cloud security fundamentals part 4: Align and automate with policy as code
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Cloud security fundamentals part 4: Align and automate with policy as code
#
cloudnativesecurity
#
cloud
#
cloudsecurity
#
policyascode
Comments
Add Comment
4 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)
#
cloudsecurity
#
kubernetes
#
penetration
2
reactions
Comments
Add Comment
6 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 29 '22
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)
#
cloudsecurity
#
kubernetes
#
penetration
5
reactions
Comments
Add Comment
9 min read
Cloud security fundamentals part 3: Empower your developers
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Cloud security fundamentals part 3: Empower your developers
#
cloudnativesecurity
#
cloud
#
cloudsecurity
Comments
Add Comment
5 min read
Cloud security fundamentals part 2: Prevention and secure design
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Cloud security fundamentals part 2: Prevention and secure design
#
cloudnativesecurity
#
cloud
#
cloudsecurity
Comments
Add Comment
5 min read
Can't miss Security Sessions at re:Invent 2022
Chris Farris
Chris Farris
Chris Farris
Follow
for
AWS Community Builders
Oct 10 '22
Can't miss Security Sessions at re:Invent 2022
#
aws
#
cloudsecurity
6
reactions
Comments
Add Comment
13 min read
Cloud security fundamentals part 1: Know your environment
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Cloud security fundamentals part 1: Know your environment
#
cloudnativesecurity
#
cloud
#
cloudsecurity
Comments
Add Comment
5 min read
Why developers hold the key to cloud security
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Why developers hold the key to cloud security
#
applicationsecurity
#
cloudnativesecurity
#
cloudsecurity
#
iac
Comments
Add Comment
6 min read
Announcing the 2022 State of Cloud Security report from Snyk
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Sep 19 '22
Announcing the 2022 State of Cloud Security report from Snyk
#
cloudnativesecurity
#
cloudsecurity
Comments
Add Comment
3 min read
AWS Security Stories #03: CIS Controls
Sedat SALMAN
Sedat SALMAN
Sedat SALMAN
Follow
for
AWS Community Builders
May 31 '22
AWS Security Stories #03: CIS Controls
#
aws
#
cis
#
cloudsecurity
#
compliance
2
reactions
Comments
Add Comment
5 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?
Hughes Systique Corp
Hughes Systique Corp
Hughes Systique Corp
Follow
Apr 22 '22
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?
#
cloud
#
security
#
cloudsecurity
4
reactions
Comments
Add Comment
4 min read
How to perform a security audit of your AWS account in AWS CloudShell
bob-bot
bob-bot
bob-bot
Follow
for
AWS Community Builders
May 20 '22
How to perform a security audit of your AWS account in AWS CloudShell
#
aws
#
cloudshell
#
steampipe
#
cloudsecurity
27
reactions
Comments
3
comments
3 min read
Abusing Managed Identities
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 4 '22
Abusing Managed Identities
#
azure
#
pentest
#
cloudsecurity
9
reactions
Comments
Add Comment
4 min read
Soft Deleted Blobs
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 8 '22
Soft Deleted Blobs
#
azure
#
pentest
#
cloudsecurity
4
reactions
Comments
Add Comment
3 min read
Extracting credentials from App Service
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 3 '22
Extracting credentials from App Service
#
azure
#
cloudsecurity
#
pentest
5
reactions
Comments
Add Comment
1 min read
Exfiltering VM disks using PowerZure
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 2 '22
Exfiltering VM disks using PowerZure
#
azure
#
cloudsecurity
#
pentest
3
reactions
Comments
Add Comment
2 min read
Anonymous Blob Access
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 5 '22
Anonymous Blob Access
#
azure
#
pentest
#
cloudsecurity
9
reactions
Comments
Add Comment
2 min read
Extracting stored passwords and certificates from Automation accounts
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 4 '22
Extracting stored passwords and certificates from Automation accounts
#
azure
#
pentest
#
cloudsecurity
5
reactions
Comments
Add Comment
2 min read
Enumerating subscription information with MicroBurst
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 2 '22
Enumerating subscription information with MicroBurst
#
azure
#
cloudsecurity
#
pentest
6
reactions
Comments
Add Comment
2 min read
Escalating Privileges using a misconfigured service principal
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 5 '22
Escalating Privileges using a misconfigured service principal
#
azure
#
pentest
#
cloudsecurity
5
reactions
Comments
Add Comment
3 min read
Gathering Subscription access information with PowerZure
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Mar 31 '22
Gathering Subscription access information with PowerZure
#
azure
#
pentest
#
cloudsecurity
5
reactions
Comments
Add Comment
2 min read
Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)
Tiexin Guo
Tiexin Guo
Tiexin Guo
Follow
for
GitGuardian
Dec 15 '21
Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)
#
kubernetes
#
cloud
#
cloudsecurity
3
reactions
Comments
Add Comment
5 min read
Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)
Tiexin Guo
Tiexin Guo
Tiexin Guo
Follow
for
GitGuardian
Dec 15 '21
Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)
#
kubernetes
#
cloud
#
cloudsecurity
2
reactions
Comments
Add Comment
11 min read
Enforcing Image Trust on Docker Containers using Notary
Frederick Fernando
Frederick Fernando
Frederick Fernando
Follow
Oct 5 '21
Enforcing Image Trust on Docker Containers using Notary
#
security
#
cloudnative
#
cloudsecurity
4
reactions
Comments
Add Comment
6 min read
Starting your Cloud Security Journey
Frederick Fernando
Frederick Fernando
Frederick Fernando
Follow
Oct 5 '21
Starting your Cloud Security Journey
#
cloudnative
#
cloudsecurity
#
securityengineering
#
security
4
reactions
Comments
Add Comment
6 min read
Five Common Cloud Security Threats and Data Breaches
Andreas Dann
Andreas Dann
Andreas Dann
Follow
for
AWS Community Builders
Aug 16 '21
Five Common Cloud Security Threats and Data Breaches
#
cloudnative
#
security
#
cloudsecurity
21
reactions
Comments
4
comments
8 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account