Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

5
Comments
9 min read
Cloud security fundamentals part 3: Empower your developers

Cloud security fundamentals part 3: Empower your developers

Comments
5 min read
Cloud security fundamentals part 2: Prevention and secure design

Cloud security fundamentals part 2: Prevention and secure design

Comments
5 min read
Can't miss Security Sessions at re:Invent 2022
Cover image for Can't miss Security Sessions at re:Invent 2022

Can't miss Security Sessions at re:Invent 2022

6
Comments
13 min read
Cloud security fundamentals part 1: Know your environment

Cloud security fundamentals part 1: Know your environment

Comments
5 min read
Why developers hold the key to cloud security

Why developers hold the key to cloud security

Comments
6 min read
Announcing the 2022 State of Cloud Security report from Snyk

Announcing the 2022 State of Cloud Security report from Snyk

Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?
Cover image for While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

4
Comments
4 min read
How to perform a security audit of your AWS account in AWS CloudShell

How to perform a security audit of your AWS account in AWS CloudShell

27
Comments 3
3 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

5
Comments
2 min read
Extracting credentials from App Service

Extracting credentials from App Service

5
Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

3
Comments
2 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

11
Comments
2 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

4
Comments
2 min read
Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)
Cover image for Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

3
Comments
5 min read
Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)
Cover image for Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

2
Comments
11 min read
Enforcing Image Trust on Docker Containers using Notary

Enforcing Image Trust on Docker Containers using Notary

3
Comments
6 min read
Starting your Cloud Security Journey

Starting your Cloud Security Journey

4
Comments
6 min read
Five Common Cloud Security Threats and Data Breaches
Cover image for Five Common Cloud Security Threats and Data Breaches

Five Common Cloud Security Threats and Data Breaches

21
Comments 4
8 min read
What COVID-19 Taught the Cyber Security Industry: Security Chaos Engineering
Cover image for What COVID-19 Taught the Cyber Security Industry: Security Chaos Engineering

What COVID-19 Taught the Cyber Security Industry: Security Chaos Engineering

6
Comments
5 min read
Protect secrets in Azure Functions using Key Vault
Cover image for Protect secrets in Azure Functions using Key Vault

Protect secrets in Azure Functions using Key Vault

11
Comments
5 min read
loading...