AWS Services and Concepts on the AWS Security Specialty Exam [Cheat Sheet]
Sometimes the hardest part is knowing where to start studying for an exam. With so much to learn and so many different topics, what should…
Sometimes the hardest part is knowing where to start studying for an exam. With so much to learn and so many different topics, what should…
Are you keeping your data stored in AWS safe? Amazon S3 has multiple controls you can use to protect your data. Let’s take a look:…
My AWS access keys were exposed and are being exploited by a threat actor. What do I do?!?! Step 1: Don’t panic! I’ve got you.…
Learning how to keep your Amazon S3 buckets safe and finding weak spots in bucket policies is an important part of managing AWS resources and…
It wasn’t that long ago when long-term access keys were one of the primary methods for accessing AWS resources and environments. You would create an…
Security Hub is a Cloud Security Posture Management (CSPM) service that you can use to perform security best practice checks, aggregate alerts, and enable automated…
Whether you’re actively trying to secure your AWS environments, you’re studying for the Certified Security Specialty exam, or you’re just curious and want to learn…
To control the flow of data in and out of your VPCs and Subnets in AWS, you can use Network Access Control Lists (NACLs), Security Groups…
Most of us know that having visibility into our cloud accounts and resources is critical, but it can easily be overwhelming to implement. What should…
We posted a video introducing the benefits of Infrastructure as Code (IaC) scanning and Policy as Code scanning, and why you absolutely should be running…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.