Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]
Cover image for 🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

Comments
4 min read
🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS
Cover image for 🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

7
Comments 1
3 min read
Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

1
Comments
4 min read
How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

1
Comments
4 min read
Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Comments
6 min read
Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live
Cover image for Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Templates, Automation, and Playbooks: My AWS IR Toolkit is Now Live

Comments
1 min read
📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)
Cover image for 📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

📘 AWS IAM Roles Explained Desi-Style — Guest Lecturers, Inter-School Passes & Temporary IDs! (Part 3)

2
Comments
3 min read
Cloud Security: Risks and Solutions
Cover image for Cloud Security: Risks and Solutions

Cloud Security: Risks and Solutions

12
Comments 2
4 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Boundaries & Principal’s Final Word! (Part 2)

8
Comments 3
3 min read
Reglas administradas AWS WAF Owasp Top Ten
Cover image for Reglas administradas AWS WAF Owasp Top Ten

Reglas administradas AWS WAF Owasp Top Ten

3
Comments 2
7 min read
Cloud Security – Your First Line of Defense in a Digital World
Cover image for Cloud Security – Your First Line of Defense in a Digital World

Cloud Security – Your First Line of Defense in a Digital World

1
Comments
1 min read
India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

Comments
2 min read
Cloud Security – Protecting Innovation at Cloud Speed
Cover image for Cloud Security – Protecting Innovation at Cloud Speed

Cloud Security – Protecting Innovation at Cloud Speed

Comments
1 min read
📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)
Cover image for 📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)

📘 AWS IAM Explained Desi-Style — With Hall Passes, Principals & Guest Lecturers! (Part 1)

6
Comments 2
4 min read
Git Tales: Part 2 - Demons in the Cloud
Cover image for Git Tales: Part 2 - Demons in the Cloud

Git Tales: Part 2 - Demons in the Cloud

3
Comments
5 min read
Why Zero Trust Network is Essential for Cloud Security in 2025

Why Zero Trust Network is Essential for Cloud Security in 2025

1
Comments
5 min read
Implementing Pre-Signed URLs for Secure Access to Static Content
Cover image for Implementing Pre-Signed URLs for Secure Access to Static Content

Implementing Pre-Signed URLs for Secure Access to Static Content

1
Comments
2 min read
Mastering Infrastructure as Code: My Terraform Journey in Cloud Security
Cover image for Mastering Infrastructure as Code: My Terraform Journey in Cloud Security

Mastering Infrastructure as Code: My Terraform Journey in Cloud Security

1
Comments
3 min read
AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified
Cover image for AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified

AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified

1
Comments
8 min read
What is Cloud Workload & Its Types?

What is Cloud Workload & Its Types?

Comments
3 min read
If You Can't Control Access, You Can't Control the Cloud (Part 2)
Cover image for If You Can't Control Access, You Can't Control the Cloud (Part 2)

If You Can't Control Access, You Can't Control the Cloud (Part 2)

4
Comments
6 min read
Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM
Cover image for Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM

Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM

1
Comments
6 min read
Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World
Cover image for Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World

Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World

1
Comments
5 min read
🔐 Zero Trust: The Future of Cloud Security
Cover image for 🔐 Zero Trust: The Future of Cloud Security

🔐 Zero Trust: The Future of Cloud Security

Comments
1 min read
No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security
Cover image for No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security

No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security

4
Comments
7 min read
loading...