Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage
Cover image for Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

3
Comments
3 min read
Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

4
Comments
4 min read
Cloud security fundamentals part 5: measure what matters

Cloud security fundamentals part 5: measure what matters

Comments
4 min read
Cloud security fundamentals part 4: Align and automate with policy as code

Cloud security fundamentals part 4: Align and automate with policy as code

Comments
4 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

2
Comments
6 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

5
Comments
9 min read
Cloud security fundamentals part 3: Empower your developers

Cloud security fundamentals part 3: Empower your developers

Comments
5 min read
Cloud security fundamentals part 2: Prevention and secure design

Cloud security fundamentals part 2: Prevention and secure design

Comments
5 min read
Can't miss Security Sessions at re:Invent 2022
Cover image for Can't miss Security Sessions at re:Invent 2022

Can't miss Security Sessions at re:Invent 2022

6
Comments
13 min read
Cloud security fundamentals part 1: Know your environment

Cloud security fundamentals part 1: Know your environment

Comments
5 min read
Why developers hold the key to cloud security

Why developers hold the key to cloud security

Comments
6 min read
Announcing the 2022 State of Cloud Security report from Snyk

Announcing the 2022 State of Cloud Security report from Snyk

Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?
Cover image for While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

4
Comments
4 min read
How to perform a security audit of your AWS account in AWS CloudShell

How to perform a security audit of your AWS account in AWS CloudShell

27
Comments 3
3 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

5
Comments
2 min read
Extracting credentials from App Service

Extracting credentials from App Service

5
Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

3
Comments
2 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

11
Comments
2 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

4
Comments
2 min read
Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)
Cover image for Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

3
Comments
5 min read
Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)
Cover image for Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

2
Comments
11 min read
loading...