Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Here's how to pick a SIEM: Cloud-focused tools, uses, and pros/cons from my experience

Here's how to pick a SIEM: Cloud-focused tools, uses, and pros/cons from my experience

Comments
4 min read
Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?
Cover image for Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Comments
1 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗔𝘇𝘂𝗿𝗲 𝗦𝗲𝗰𝗿𝗲𝘁𝘀

𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗔𝘇𝘂𝗿𝗲 𝗦𝗲𝗰𝗿𝗲𝘁𝘀

5
Comments
1 min read
Stop, Review, Release: Email Holding in M365

Stop, Review, Release: Email Holding in M365

1
Comments
2 min read
#DAY 3: The Cloud Brain
Cover image for #DAY 3: The Cloud Brain

#DAY 3: The Cloud Brain

6
Comments
4 min read
Design and Implement Role-Based Access with AWS IAM
Cover image for Design and Implement Role-Based Access with AWS IAM

Design and Implement Role-Based Access with AWS IAM

Comments
7 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)
Cover image for Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)
Cover image for 🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

Comments
4 min read
Understanding Zero Trust: The Future of Cyber security
Cover image for Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
Fixing “Service Account Key Creation is Disabled” in Google Cloud
Cover image for Fixing “Service Account Key Creation is Disabled” in Google Cloud

Fixing “Service Account Key Creation is Disabled” in Google Cloud

Comments
2 min read
Configuring Secure Access to Workloads with Azure Virtual Networking Services
Cover image for Configuring Secure Access to Workloads with Azure Virtual Networking Services

Configuring Secure Access to Workloads with Azure Virtual Networking Services

6
Comments
2 min read
How to Increase Your Azure Secure Score and Strengthen Your Cloud Security
Cover image for How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

49
Comments
4 min read
Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)
Cover image for Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)

Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)

2
Comments 7
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]
Cover image for 🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

Comments
4 min read
🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS
Cover image for 🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

7
Comments 1
3 min read
Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

1
Comments
4 min read
How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

1
Comments
4 min read
Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Comments
6 min read
Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live
Cover image for Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Comments
1 min read
📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)
Cover image for 📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

2
Comments
3 min read
Cloud Security: Risks and Solutions
Cover image for Cloud Security: Risks and Solutions

Cloud Security: Risks and Solutions

12
Comments 2
4 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

8
Comments 3
3 min read
Reglas administradas AWS WAF Owasp Top Ten
Cover image for Reglas administradas AWS WAF Owasp Top Ten

Reglas administradas AWS WAF Owasp Top Ten

3
Comments 2
7 min read
loading...