Create a least privilege S3 bucket policy [Cheat Sheet]
Learning how to keep your Amazon S3 buckets safe and finding weak spots in bucket policies is an important part of managing AWS resources and…
Learning how to keep your Amazon S3 buckets safe and finding weak spots in bucket policies is an important part of managing AWS resources and…
It wasn’t that long ago when long-term access keys were one of the primary methods for accessing AWS resources and environments. You would create an…
Are you following CloudTrail best practices? Here’s a simple checklist ✅ Under the hood, AWS Security Hub service is looking for these best practices: ✅ [CloudTrail.1] CloudTrail…
Security Hub is a Cloud Security Posture Management (CSPM) service that you can use to perform security best practice checks, aggregate alerts, and enable automated…
Whether you’re actively trying to secure your AWS environments, you’re studying for the Certified Security Specialty exam, or you’re just curious and want to learn…
Understanding this isn’t required for the CompTIA Security+ exam, meaning that we’re going beyond the scope of this exam for a few minutes, but I…
There’s been a security incident in your organization. What do you do? Panic? No ;)! You follow an incident response process. In this article, we’re…
To control the flow of data in and out of your VPCs and Subnets in AWS, you can use Network Access Control Lists (NACLs), Security Groups…
In our course, we talk about Zero Trust and how it’s an approach that believes in continuously checking access and policy violations, even within internal…
We talked about ciphers and block ciphers in the prior post. A block cipher on its own would only ever encrypt a single block of…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.