DEV Community

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Future of Security is Identity: How IAM is Redefining Enterprise Protection

The Future of Security is Identity: How IAM is Redefining Enterprise Protection

Comments
3 min read
AWS SAA to Security Clearance: My Path to Federal Cloud Engineering

AWS SAA to Security Clearance: My Path to Federal Cloud Engineering

Comments
3 min read
The Cost of a Cloud Breach for a Mid-Sized Law Firm: Risks & Solutions

The Cost of a Cloud Breach for a Mid-Sized Law Firm: Risks & Solutions

Comments
5 min read
AWS Route 53 Resolver DNS Firewall — The First Line of Egress Defense

AWS Route 53 Resolver DNS Firewall — The First Line of Egress Defense

6
Comments
4 min read
Reglas Personalizadas en Web Application Firewall nativo AWS

Reglas Personalizadas en Web Application Firewall nativo AWS

2
Comments
5 min read
Building Security by Design: My AWS Project Showcasing VPC, NAT Gateway, and Private Networking Mastery

Building Security by Design: My AWS Project Showcasing VPC, NAT Gateway, and Private Networking Mastery

Comments
10 min read
Cloud Security Protecting Your Data in the Digital Sky

Cloud Security Protecting Your Data in the Digital Sky

5
Comments
2 min read
Entra ID: The Beating Heart of Azure

Entra ID: The Beating Heart of Azure

1
Comments 1
4 min read
Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Comments
1 min read
Implementing Terraform Drift Detection in Your Workflow

Implementing Terraform Drift Detection in Your Workflow

2
Comments
7 min read
💡Idea: Using VPN-Type Virtual Links for Secure IoT Data Flow

💡Idea: Using VPN-Type Virtual Links for Secure IoT Data Flow

11
Comments
2 min read
The #1 Cloud Security Mistake Law Firms Make: Not Protecting Client Data

The #1 Cloud Security Mistake Law Firms Make: Not Protecting Client Data

3
Comments
5 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

2
Comments
4 min read
𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗔𝘇𝘂𝗿𝗲 𝗦𝗲𝗰𝗿𝗲𝘁𝘀

𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗔𝘇𝘂𝗿𝗲 𝗦𝗲𝗰𝗿𝗲𝘁𝘀

5
Comments
1 min read
AWS IAM Users and Roles in the context of Zero Trust Security Framework

AWS IAM Users and Roles in the context of Zero Trust Security Framework

Comments
3 min read
AI and Attorney-Client Privilege: Hidden Cloud Risks and How to Keep Confidentiality Safe

AI and Attorney-Client Privilege: Hidden Cloud Risks and How to Keep Confidentiality Safe

1
Comments
4 min read
Cloud Security Fundamentals: Multi-Platform Protection Strategies

Cloud Security Fundamentals: Multi-Platform Protection Strategies

1
Comments 1
3 min read
Fantastic AWS Policies and Where to Find Them

Fantastic AWS Policies and Where to Find Them

2
Comments 1
9 min read
Design and Implement Role-Based Access with AWS IAM

Design and Implement Role-Based Access with AWS IAM

Comments
7 min read
Here's how to pick a SIEM: Cloud-focused tools, uses, and pros/cons from my experience

Here's how to pick a SIEM: Cloud-focused tools, uses, and pros/cons from my experience

Comments
4 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

Comments
4 min read
Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
Stop, Review, Release: Email Holding in M365

Stop, Review, Release: Email Holding in M365

1
Comments
2 min read
loading...