Found 82 bookmarks
Newest
Cloud storage security: What's new in the threat matrix | Microsoft Security Blog
Cloud storage security: What's new in the threat matrix | Microsoft Security Blog
We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services.
·microsoft.com·
Cloud storage security: What's new in the threat matrix | Microsoft Security Blog
About - AWS Cloud Security Weekly
About - AWS Cloud Security Weekly
A hands-on style weekly newsletter for cloud security professional, including executives, focused on latest cloud security (especially AWS) news/releases/trends. Click to read AWS Cloud Security Weekly, by AWS-CloudSec Weekly Newsletter, a Substack publication. Launched a month ago.
·aws-cloudsec.com·
About - AWS Cloud Security Weekly
AWS Security Monitoring in 2023: Untangle the chaos
AWS Security Monitoring in 2023: Untangle the chaos
Discover Effective AWS Security Monitoring Strategies. Combining the right AWS services is key when setting up AWS Security Monitoring.
·cloudonaut.io·
AWS Security Monitoring in 2023: Untangle the chaos
Cloud CISO Perspectives: Early July 2023 | Google Cloud Blog
Cloud CISO Perspectives: Early July 2023 | Google Cloud Blog
Google Cloud CISO Phil Venables talks with Royal Hansen, vice president of Privacy, Safety, and Security Engineering at Google, about red teaming AI and the Aspen Security Forum.
·cloud.google.com·
Cloud CISO Perspectives: Early July 2023 | Google Cloud Blog
AWS CloudTrail cheat sheet
AWS CloudTrail cheat sheet
Incident Response in AWS made easy (easier 😉)
·invictus-ir.medium.com·
AWS CloudTrail cheat sheet
Using Service Control Policies to protect security baselines | Wiz Blog
Using Service Control Policies to protect security baselines | Wiz Blog
Service Control Policies (SCPs) can be a great way to prevent actions from happening in AWS accounts. In this post, we will illustrate a specific use case of SCPs that protects the security baseline, or landing zone, configuration you’ve created for accounts
·wiz.io·
Using Service Control Policies to protect security baselines | Wiz Blog
Cloud Security Atlas | Datadog Security Labs
Cloud Security Atlas | Datadog Security Labs
Datadog Cloud Security Atlas is a risk register for Threats and Vulnerabilities. This database gives you the ability to search and filter on your cloud provider platform, risk type, and sort by impact, exploitability, and recency.,Test out the search below by searching for specific cloud services like EBS or S3. From there you can chart your own course to understanding risk that relates to your environment.
·securitylabs.datadoghq.com·
Cloud Security Atlas | Datadog Security Labs
GitHub - iknowjason/Awesome-CloudSec-Labs: Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
GitHub - iknowjason/Awesome-CloudSec-Labs: Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs. - GitHub - iknowjason/Awesome-CloudSec-Labs: Awesome free clou...
·github.com·
GitHub - iknowjason/Awesome-CloudSec-Labs: Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
GitHub - aws-samples/service-control-policy-examples: Example AWS Service control policies to get started or mature your usage of AWS SCPs.
GitHub - aws-samples/service-control-policy-examples: Example AWS Service control policies to get started or mature your usage of AWS SCPs.
Example AWS Service control policies to get started or mature your usage of AWS SCPs. - GitHub - aws-samples/service-control-policy-examples: Example AWS Service control policies to get started or ...
·github.com·
GitHub - aws-samples/service-control-policy-examples: Example AWS Service control policies to get started or mature your usage of AWS SCPs.
AWS KMS Threat Model
AWS KMS Threat Model
What are the threats in letting an AWS service manage the encryption of your data instead of creating a Customer Managed Key?
·airwalkreply.com·
AWS KMS Threat Model