Forem

# cloudsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Configuring Secure Access to Workloads with Azure Virtual Networking Services
Cover image for Configuring Secure Access to Workloads with Azure Virtual Networking Services

Configuring Secure Access to Workloads with Azure Virtual Networking Services

5
Comments
2 min read
Modern Classrooms with Microsoft 365 Business Premium: Blending Learning and Security

Modern Classrooms with Microsoft 365 Business Premium: Blending Learning and Security

Comments
2 min read
Design and Implement Role-Based Access with AWS IAM
Cover image for Design and Implement Role-Based Access with AWS IAM

Design and Implement Role-Based Access with AWS IAM

Comments
7 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)
Cover image for Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)
Cover image for 🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

Comments
4 min read
Understanding Zero Trust: The Future of Cyber security
Cover image for Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
Fixing “Service Account Key Creation is Disabled” in Google Cloud
Cover image for Fixing “Service Account Key Creation is Disabled” in Google Cloud

Fixing “Service Account Key Creation is Disabled” in Google Cloud

Comments
2 min read
How to Increase Your Azure Secure Score and Strengthen Your Cloud Security
Cover image for How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

49
Comments
4 min read
Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)
Cover image for Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)

Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)

2
Comments 7
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]
Cover image for 🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

Comments
4 min read
🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS
Cover image for 🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

7
Comments 1
3 min read
Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

1
Comments
4 min read
How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

1
Comments
4 min read
Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Comments
6 min read
Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live
Cover image for Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Comments
1 min read
📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)
Cover image for 📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

2
Comments
3 min read
India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

Comments
2 min read
Cloud Security: Risks and Solutions
Cover image for Cloud Security: Risks and Solutions

Cloud Security: Risks and Solutions

12
Comments 2
4 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

8
Comments 3
3 min read
Reglas administradas AWS WAF Owasp Top Ten
Cover image for Reglas administradas AWS WAF Owasp Top Ten

Reglas administradas AWS WAF Owasp Top Ten

3
Comments 2
7 min read
Cloud Security – Your First Line of Defense in a Digital World
Cover image for Cloud Security – Your First Line of Defense in a Digital World

Cloud Security – Your First Line of Defense in a Digital World

1
Comments
1 min read
Cloud Security – Protecting Innovation at Cloud Speed
Cover image for Cloud Security – Protecting Innovation at Cloud Speed

Cloud Security – Protecting Innovation at Cloud Speed

Comments
1 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)

6
Comments 2
4 min read
Abuse OpenID Connect and GitLab for AWS Access.

Abuse OpenID Connect and GitLab for AWS Access.

Comments
10 min read
loading...