Cloud Security (25)

Understanding GCP Identity and Access Management

GCP IAM is a fine-grained identity and access management service powered by Google Cloud. You may use this utility to restrict which users have access to which resources.

Securing Docker Containers

Programmers mostly encapsulate and deliver the source code in containers, often Docker containers. Now that we have learned what is Docker and its benefits let’s leverage this with a security focus. In this blog post, we will learn how to harden docker containers.

Hands-on with Google Cloud Key Management Service (KMS)

In this blog post we will learn what a KMS, how we can secure our application keys with it and finally create our first keys.

Enumerating and Exploiting AWS S3 Buckets with S3Scanner and Flaws.cloud

Now that we are done with enumerating S3 buckets in our previous article: S3 Bucket URL Enumeration . We are ready to dump the publicly available files.

Azure Sentinel: A Beginner's Guide

Azure Sentinel is a system that runs on the Azure cloud platform used for security and information management. It combines threat detection with the ability to see potential threats, which it employs to give a threat response. It’s a comprehensive security management system.

S3 Bucket URL Enumeration

A storage service is a standard facility that cloud service providers often give to clients. And Simple Storage Service is the name of AWS’s storage facility (which is also abbreviated as S3).

Additional Security with Amazon EMR

AWS offers web-based analytical services to assist you in processing and analyzing large quantities of data, regardless of whether you require controlled Hadoop clusters, live streaming, massive data warehousing, or orchestrating. In this blog article, we will introduce Amazon EMR which is formerly known as Elastic MapReduce, and examine its security benefits.

Understanding User Roles and IAM in AWS

IAM stands for “Identity and Access Management”, it allows you to restrict who and what applications may access the AWS environment which is also referred to as entities or principals. Today, in this article we will explore fundamental principals in IAM.

Custom Security Groups on AWS

A security group functions as a cloud-based firewall, regulating the communications that can reach and exit the resources with which it is linked. Let’s say you don’t want to use the built-in security groups. What should you do? AWS offers custom security groups for this purpose, which is the topic of today’s blog post.

A Brief Overview into Containers and the Challenges they Address

This blog article will provide you with an overview of containers and how they affect the overall information technology environment.

Improving DevOps Pipeline Security

DevOps is more than tools. It is also securing our environment from the very start. In this blog article, we will discuss how we can secure our DevOps pipeline.

General Security Risks when Applying DevOps

Applying DevOps without considering security would undoubtedly lead to an increased risk of cyberattacks by growing the attack surface of organizations. This blog post will give you a strong understanding of general security risks in DevOps and how to address them.

Shared Security Responsibilities in AWS

AWS provides a flexible cloud computing technology offering high availability and reliability, as well as the resources needed to operate a broad spectrum of applications. These resources help you safeguard the secrecy, authenticity, and accessibility of your infrastructure. But what are the boundaries of different security responsibilities between a cloud tenant and a cloud provider? This article answers this question in Amazon Web Services particular.

A Quick Overview of Container Vulnerabilities

There are various ways to attack a containerized operation. In this article we will discuss a few basic vulnerabilities that could be present within a container.

Security Measures to Protect your AWS Simple Storage Service (S3)

Amazon S3 is a web storage service offered by Amazon. It provides customers with secure access to their data from anywhere at anytime. The service is designed to provide reliable storage and retrieval of large amounts of data. There are numerous ways to manage security for an S3 bucket. In this blog post we will take a look at these methods. Let’s start with defining objects.

A Brief Explanation of Zero-Trust Security Architecture

Zero Trust is a security model that aims to eliminate vulnerabilities by reducing unnecessary access points. In other words, zero trust means no single point of failure. In this blog post, we are going to define certain methods to achieve this in our cloud-based business to improve security.

The Security Advantages of AWS Elastic Load Balancing (ELB)

This blog post will provide you with the security perks of an Elastic Load Balancing (ELB) service.

A Brief Introduction to AWS Key Management Service

In this blog post, we will deep dive into the Key Management Service offered by AWS.

AWS Password Policies

Most of the time, you will need a password to complete your actions in AWS. The password is set when you register the account, and you may modify it at any time by visiting the Security Credentials page. Let’s learn what are your different password policy options.

A Quick Start Guide to Network Monitoring and Security features in AWS

Amazon web services offer strong protection against standard network security vulnerabilities. In this blog post you’ll find some of the network management and defense services and functionalities that AWS offers for clients.

Compliance and Security in Amazon Web Services (AWS)

Information security is crucial for enterprises operating critical workloads, whether on-premises or in any cloud provider’s data centers. Security is a fundamental need that protects vital data from unintentional or intentional stealing, disclosure, breach, and removal.

Business Impact Analysis Issues in the Cloud

A successful Business Impact Analysis allows us to ensure the resilience and sustainability of cloud operations during and after an interruption, which is also known as Disaster Recovery (DR) and Business Continuity (BC).

Cloud-Based Key Control

How safe are your cloud-stored keys? Where and how secret keys are kept can have a substantial impact on the overall security of the data.

Enumerating AWS S3 Buckets

S3 buckets are one of the most important aspects of Amazon Web Services (AWS). They are used to store and retrieve data and can be accessed from anywhere in the world. S3 buckets are also used to host static websites. In this article, we will look into different techniques attackers use to identify AWS S3 Buckets.

Secure Your AWS Root Account with 5 Best Practices

Your AWS root account is the most important account in your AWS environment, and it’s critical that you take steps to secure it. This article proposes five best practices to follow.