Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live
Cover image for Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Comments
1 min read
📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)
Cover image for 📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

2
Comments
3 min read
Cloud Security: Risks and Solutions
Cover image for Cloud Security: Risks and Solutions

Cloud Security: Risks and Solutions

12
Comments 2
4 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

8
Comments 3
3 min read
Reglas administradas AWS WAF Owasp Top Ten
Cover image for Reglas administradas AWS WAF Owasp Top Ten

Reglas administradas AWS WAF Owasp Top Ten

3
Comments 2
7 min read
Cloud Security – Your First Line of Defense in a Digital World
Cover image for Cloud Security – Your First Line of Defense in a Digital World

Cloud Security – Your First Line of Defense in a Digital World

1
Comments
1 min read
India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

Comments
2 min read
Cloud Security – Protecting Innovation at Cloud Speed
Cover image for Cloud Security – Protecting Innovation at Cloud Speed

Cloud Security – Protecting Innovation at Cloud Speed

Comments
1 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)

6
Comments 2
4 min read
Git Tales: Part 2 - Demons in the Cloud
Cover image for Git Tales: Part 2 - Demons in the Cloud

Git Tales: Part 2 - Demons in the Cloud

3
Comments
5 min read
Why Zero Trust Network is Essential for Cloud Security in 2025

Why Zero Trust Network is Essential for Cloud Security in 2025

1
Comments
5 min read
Implementing Pre-Signed URLs for Secure Access to Static Content
Cover image for Implementing Pre-Signed URLs for Secure Access to Static Content

Implementing Pre-Signed URLs for Secure Access to Static Content

1
Comments
2 min read
Mastering Infrastructure as Code: My Terraform Journey in Cloud Security
Cover image for Mastering Infrastructure as Code: My Terraform Journey in Cloud Security

Mastering Infrastructure as Code: My Terraform Journey in Cloud Security

1
Comments
3 min read
AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified
Cover image for AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified

AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified

1
Comments
8 min read
What is Cloud Workload & Its Types?

What is Cloud Workload & Its Types?

Comments
3 min read
If You Can't Control Access, You Can't Control the Cloud (Part 2)
Cover image for If You Can't Control Access, You Can't Control the Cloud (Part 2)

If You Can't Control Access, You Can't Control the Cloud (Part 2)

4
Comments
6 min read
Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM
Cover image for Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM

Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM

1
Comments
6 min read
Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World
Cover image for Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World

Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World

1
Comments
5 min read
🔐 Zero Trust: The Future of Cloud Security
Cover image for 🔐 Zero Trust: The Future of Cloud Security

🔐 Zero Trust: The Future of Cloud Security

Comments
1 min read
No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security
Cover image for No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security

No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security

4
Comments
7 min read
Why is Sovereign Cloud Important?

Why is Sovereign Cloud Important?

Comments
3 min read
Preventing Exploitable Cloud Misconfigurations Using IAM Access Analyzer

Preventing Exploitable Cloud Misconfigurations Using IAM Access Analyzer

Comments
4 min read
Recent Security Alerts: GitHub Actions Hijack and Kubernetes Ingress-NGINX Vulnerability

Recent Security Alerts: GitHub Actions Hijack and Kubernetes Ingress-NGINX Vulnerability

Comments
1 min read
Abuse OpenID Connect and GitLab for AWS Access.

Abuse OpenID Connect and GitLab for AWS Access.

Comments 1
10 min read
Why Cloud Security Monitoring is Essential for Protecting Business Data
Cover image for Why Cloud Security Monitoring is Essential for Protecting Business Data

Why Cloud Security Monitoring is Essential for Protecting Business Data

Comments
3 min read
loading...