Getting Started with AWS KMS [Cheat Sheet]
Alright, this one is going to take a series but listen up because it’s super important! There’s a lot to talk about when it comes…
Alright, this one is going to take a series but listen up because it’s super important! There’s a lot to talk about when it comes…
Here’s a CloudTrail CLI cheat sheet in both downloadable image format and text format for reference. AWS CloudTrail Downloadable CLI Cheat Sheet Please note this…
How can you tell if your threat detection measures are working in AWS? Or that your security controls and incident response playbooks are effective? One…
Securing your AWS accounts and environments starts with implementing AWS IAM best practices. Get this right and you will have a solid security foundation. Get…
Our live presentation on Attacking & Defending Amazon EKS sparked interesting questions and conversations regarding the biggest threats to Amazon EKS (and Kubernetes in general). A…
Sometimes the hardest part is knowing where to start studying for an exam. With so much to learn and so many different topics, what should…
Are you keeping your data stored in AWS safe? Amazon S3 has multiple controls you can use to protect your data. Let’s take a look:…
My AWS access keys were exposed and are being exploited by a threat actor. What do I do?!?! Step 1: Don’t panic! I’ve got you.…
Learning how to keep your Amazon S3 buckets safe and finding weak spots in bucket policies is an important part of managing AWS resources and…
Are you following CloudTrail best practices? Here’s a simple checklist ✅ Under the hood, AWS Security Hub service is looking for these best practices: ✅ [CloudTrail.1] CloudTrail…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.