DEV Community

# cloudsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A playground to practice differential privacy - Antigranular

A playground to practice differential privacy - Antigranular

Comments
6 min read
Azure Cloud & Container Security Best Practices

Azure Cloud & Container Security Best Practices

1
Comments
10 min read
Social Engineering Attacks - Prevention and Best Practices

Social Engineering Attacks - Prevention and Best Practices

2
Comments
4 min read
What is Amazon CloudFormation?

What is Amazon CloudFormation?

Comments
3 min read
Enhancing code to cloud security with the Common Configuration Scoring System

Enhancing code to cloud security with the Common Configuration Scoring System

5
Comments
5 min read
My thoughts on AWS re:Invent 2023 announcements

My thoughts on AWS re:Invent 2023 announcements

4
Comments
6 min read
Securing AWS Environments Against Ransomware

Securing AWS Environments Against Ransomware

2
Comments
3 min read
Essential AWS IAM Enumeration Commands

Essential AWS IAM Enumeration Commands

2
Comments
6 min read
Rego 103: Types of values and rules

Rego 103: Types of values and rules

3
Comments
13 min read
Rego for beginners Part 2: Combining queries with AND/OR and custom messages

Rego for beginners Part 2: Combining queries with AND/OR and custom messages

1
Comments
10 min read
Rego for beginners: Introduction to Rego

Rego for beginners: Introduction to Rego

Comments
10 min read
Top Cloud Security Tools in 2023

Top Cloud Security Tools in 2023

Comments
4 min read
Kaynak IP’ye göre AWS Erişiminin Engellenmesi

Kaynak IP’ye göre AWS Erişiminin Engellenmesi

1
Comments 1
2 min read
Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Securing Your Secrets: An In-Depth Guide to Azure Key Vault

4
Comments
3 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets

5
Comments
7 min read
Implementing TLS in Kubernetes

Implementing TLS in Kubernetes

2
Comments
9 min read
Attack Path Analysis: What It Is and Why You Should Care

Attack Path Analysis: What It Is and Why You Should Care

4
Comments
5 min read
Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

Estrategia de seguridad en la nube de AWS, ¿Por dónde empezar?

5
Comments
6 min read
Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization

Multi-Account Security Governance as Code with Cloud Custodian on AWS Organization

7
Comments 1
6 min read
Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Protecting Your Cloud Infrastructure: AWS Native Security Strategies.

Comments
4 min read
Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

Guarding Your AWS Credentials: Identifying Compromises and Mitigating Damage

3
Comments
3 min read
Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

Securing Your AWS Infrastructure: Deploying AWS Security Services with Terraform

2
Comments
4 min read
Mapping your AWS attack surface

Mapping your AWS attack surface

8
Comments
6 min read
Cloud security fundamentals part 5: measure what matters

Cloud security fundamentals part 5: measure what matters

Comments
4 min read
Cloud security fundamentals part 4: Align and automate with policy as code

Cloud security fundamentals part 4: Align and automate with policy as code

Comments
4 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)

2
Comments
6 min read
A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 1)

5
Comments
9 min read
Cloud security fundamentals part 3: Empower your developers

Cloud security fundamentals part 3: Empower your developers

Comments
5 min read
Cloud security fundamentals part 2: Prevention and secure design

Cloud security fundamentals part 2: Prevention and secure design

Comments
5 min read
Can't miss Security Sessions at re:Invent 2022

Can't miss Security Sessions at re:Invent 2022

6
Comments
13 min read
Cloud security fundamentals part 1: Know your environment

Cloud security fundamentals part 1: Know your environment

Comments
5 min read
Why developers hold the key to cloud security

Why developers hold the key to cloud security

Comments
6 min read
Announcing the 2022 State of Cloud Security report from Snyk

Announcing the 2022 State of Cloud Security report from Snyk

Comments
3 min read
AWS Security Stories #03: CIS Controls

AWS Security Stories #03: CIS Controls

2
Comments
5 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

4
Comments
4 min read
How to perform a security audit of your AWS account in AWS CloudShell

How to perform a security audit of your AWS account in AWS CloudShell

27
Comments 3
3 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Soft Deleted Blobs

Soft Deleted Blobs

4
Comments
3 min read
Extracting credentials from App Service

Extracting credentials from App Service

5
Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

3
Comments
2 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

5
Comments
2 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

11
Comments
2 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

5
Comments
2 min read
Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

3
Comments
5 min read
Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

Hardening Your Kubernetes Cluster - Guidelines (Pt. 2)

2
Comments
11 min read
Enforcing Image Trust on Docker Containers using Notary

Enforcing Image Trust on Docker Containers using Notary

4
Comments
6 min read
Starting your Cloud Security Journey

Starting your Cloud Security Journey

4
Comments
6 min read
Five Common Cloud Security Threats and Data Breaches

Five Common Cloud Security Threats and Data Breaches

21
Comments 4
8 min read
What COVID-19 Taught the Cyber Security Industry: Security Chaos Engineering

What COVID-19 Taught the Cyber Security Industry: Security Chaos Engineering

6
Comments
5 min read
Access internal APIM securely with Private Link Service

Access internal APIM securely with Private Link Service

7
Comments
10 min read
Protect secrets in Azure Functions using Key Vault

Protect secrets in Azure Functions using Key Vault

11
Comments
5 min read
Securing Azure Logic apps with Private Endpoints

Securing Azure Logic apps with Private Endpoints

25
Comments 2
6 min read
Cloud security: gaps in a "shared responsibility" model

Cloud security: gaps in a "shared responsibility" model

7
Comments
2 min read
ScoutSuite: A Security Audit Tool for Azure

ScoutSuite: A Security Audit Tool for Azure

7
Comments 1
1 min read
How I passed the AWS Certified Security - Specialty Exam

How I passed the AWS Certified Security - Specialty Exam

6
Comments
2 min read
Revolutionizing Data Security by Design

Revolutionizing Data Security by Design

6
Comments
8 min read
AWS Increases Security Scan Freedom

AWS Increases Security Scan Freedom

10
Comments
1 min read
Fantastic! Public S3 Buckets and How to Find Them

Fantastic! Public S3 Buckets and How to Find Them

7
Comments
1 min read
loading...