DEV Community

# cloudsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
30 days of AWS - Part 6: AWS Security

30 days of AWS - Part 6: AWS Security

Comments
3 min read
What is Cloud Security? Explore its Benefits, Risks, Threats and Challenges

What is Cloud Security? Explore its Benefits, Risks, Threats and Challenges

Comments
1 min read
Securing the Cloud Frontier: Generative AI for Vulnerability Hunting

Securing the Cloud Frontier: Generative AI for Vulnerability Hunting

1
Comments
4 min read
Microsoft 365 Groups: A Comprehensive Guide

Microsoft 365 Groups: A Comprehensive Guide

1
Comments
5 min read
Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users

Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users

Comments
7 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure

The Ultimate Guide to Building a Secure Cloud Infrastructure

Comments
3 min read
Explore What is Azure Monitor: Features, Benefits, and Use Cases

Explore What is Azure Monitor: Features, Benefits, and Use Cases

2
Comments 2
3 min read
AWS Security Hub

AWS Security Hub

3
Comments
4 min read
Mastering Cloud Security: Insights from Aviatrix Immersion Day on Distributed Firewalls.

Mastering Cloud Security: Insights from Aviatrix Immersion Day on Distributed Firewalls.

Comments
2 min read
Securing Your Data in AWS : A Practical Guide

Securing Your Data in AWS : A Practical Guide

2
Comments
4 min read
Explore Cloud Security Management: Everything You Need to Know

Explore Cloud Security Management: Everything You Need to Know

3
Comments 4
4 min read
What is Azure Bastion: An In-Depth Guide to Enhanced Connectivity

What is Azure Bastion: An In-Depth Guide to Enhanced Connectivity

1
Comments 1
3 min read
Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Comments
10 min read
Trust and Transparency in Cloud Computing

Trust and Transparency in Cloud Computing

Comments
2 min read
AWS CI CD SETUP

AWS CI CD SETUP

32
Comments
3 min read
Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

11
Comments 2
3 min read
Tips to Maintain Strong Cloud Security

Tips to Maintain Strong Cloud Security

1
Comments
2 min read
Services that can integrate with AWS Certificate Manager and their Use Case

Services that can integrate with AWS Certificate Manager and their Use Case

2
Comments 2
3 min read
Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Automatic source locations with Rego

Automatic source locations with Rego

1
Comments
10 min read
Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
When Automation Meets Authentication

When Automation Meets Authentication

1
Comments 1
5 min read
How to run an AWS CIS v3.0 assessment in CloudShell

How to run an AWS CIS v3.0 assessment in CloudShell

6
Comments
2 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Start building my AWS Clean Rooms lab

Start building my AWS Clean Rooms lab

2
Comments
3 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

8
Comments 2
17 min read
𝐍𝐞𝐰 𝐜𝐨𝐮𝐫𝐬𝐞𝐬 𝐚𝐧𝐝 𝐚𝐧𝐝 𝐜𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐨𝐟𝐟𝐞𝐫𝐢𝐧𝐠𝐬 𝐟𝐫𝐨𝐦 𝐀𝐖𝐒 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐚𝐧𝐝 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐢𝐧 𝐉𝐚𝐧𝐮𝐚𝐫𝐲 𝟐𝟎𝟐𝟒

𝐍𝐞𝐰 𝐜𝐨𝐮𝐫𝐬𝐞𝐬 𝐚𝐧𝐝 𝐚𝐧𝐝 𝐜𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐨𝐟𝐟𝐞𝐫𝐢𝐧𝐠𝐬 𝐟𝐫𝐨𝐦 𝐀𝐖𝐒 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐚𝐧𝐝 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐢𝐧 𝐉𝐚𝐧𝐮𝐚𝐫𝐲 𝟐𝟎𝟐𝟒

Comments
1 min read
First Try on AWS Security Hub Central Configuration

First Try on AWS Security Hub Central Configuration

1
Comments
7 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

5
Comments
17 min read
Understanding AWS Instance Metadata Service: A Closer Look

Understanding AWS Instance Metadata Service: A Closer Look

3
Comments
8 min read
Can We Use aws:SourceVpc Condition Without a VPC Endpoint?

Can We Use aws:SourceVpc Condition Without a VPC Endpoint?

4
Comments
7 min read
What is Security and the AWS Shared Responsibility Model

What is Security and the AWS Shared Responsibility Model

Comments
2 min read
A playground to practice differential privacy - Antigranular

A playground to practice differential privacy - Antigranular

Comments
6 min read
Azure Cloud & Container Security Best Practices

Azure Cloud & Container Security Best Practices

1
Comments
10 min read
Social Engineering Attacks - Prevention and Best Practices

Social Engineering Attacks - Prevention and Best Practices

2
Comments
4 min read
Enhancing code to cloud security with the Common Configuration Scoring System

Enhancing code to cloud security with the Common Configuration Scoring System

5
Comments
5 min read
My thoughts on AWS re:Invent 2023 announcements

My thoughts on AWS re:Invent 2023 announcements

4
Comments
6 min read
Rego for beginners: Introduction to Rego

Rego for beginners: Introduction to Rego

Comments
10 min read
Rego for beginners Part 2: Combining queries with AND/OR and custom messages

Rego for beginners Part 2: Combining queries with AND/OR and custom messages

Comments
10 min read
Securing AWS Environments Against Ransomware

Securing AWS Environments Against Ransomware

4
Comments
3 min read
Essential AWS IAM Enumeration Commands

Essential AWS IAM Enumeration Commands

2
Comments
6 min read
Rego 103: Types of values and rules

Rego 103: Types of values and rules

2
Comments
13 min read
Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Securing Your Secrets: An In-Depth Guide to Azure Key Vault

1
Comments
3 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

8
Comments
7 min read
Implementing TLS in Kubernetes

Implementing TLS in Kubernetes

3
Comments
9 min read
Attack Path Analysis: What It Is and Why You Should Care

Attack Path Analysis: What It Is and Why You Should Care

2
Comments
5 min read
Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

4
Comments
6 min read
Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization

Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization

5
Comments 1
6 min read
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Comments
4 min read
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

3
Comments
3 min read
Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

1
Comments
4 min read
Mapping your AWS attack surface

Mapping your AWS attack surface

8
Comments
6 min read
Cloud security fundamentals part 5: measure what matters

Cloud security fundamentals part 5: measure what matters

Comments
4 min read
Cloud security fundamentals part 4: Align and automate with policy as code

Cloud security fundamentals part 4: Align and automate with policy as code

Comments
4 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

2
Comments
6 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

5
Comments
9 min read
Cloud security fundamentals part 3: Empower your developers

Cloud security fundamentals part 3: Empower your developers

Comments
5 min read
Cloud security fundamentals part 2: Prevention and secure design

Cloud security fundamentals part 2: Prevention and secure design

Comments
5 min read
Can't miss Security Sessions at re:Invent 2022

Can't miss Security Sessions at re:Invent 2022

6
Comments
13 min read
loading...