Socials
  • 1-234-564-3773
  • [email protected]
Cloud Security OperationsCloud Security Operations
  • Home
  • Services
  • Blog
  • Contact Us

Amazon Web Services

Cloud Penetration Testing

AWS Reconnaissance Tools

Hi all, In this post, we will discuss the various AWS Reconnaissance Tools used to recon and exploit AWS cloud accounts. Let’s first look at the reasons due to which credentials get exposed: Vulnerabilities in AWS hosted applications like SSRF (Server Side Request Forgery) and LFI (Local File Inclusion) Code Read more…

By Setu, 1 year1 year ago
cloudsecops-aws-post-exploitation
Amazon Web Services

AWS Post Exploitation – Part 1

What is AWS Post exploitation? Post exploitation is required when you’ve successfully compromised a particular target. The purpose of the AWS Post Exploitation phase is to determine the value of the account compromised and to maintain control of the account for later use. The value of the account is determined by Read more…

By Setu, 3 years2 years ago
Amazon Web Services

AWS Security Use Cases & Automations

AWS Security Automation Security automation is the automatic handling of a task in a script or machine based security application  that would otherwise be done manually by a cybersecurity professional. AWS Security Automation is  automating your AWS testing tasks like scanning, enumeration,  that would save time and workload of security Read more…

By Setu, 3 years2 years ago
cloudsecops-cloudsecurity
Amazon Web Services

Security audit using Cloud Custodian for compliance in AWS

Introduction In this article, we will be talking about Cloud Custodian, an open source rules engine for fleet management in AWS. The simple YAML DSL allows you to easily define rules to enable a well-managed cloud infrastructure, that’s both secure and cost optimized. Cloud Custodian unifies the dozens of tools Read more…

By Setu, 3 years2 years ago
cloud security
Amazon Web Services

Automated Monitoring for Security Misconfigurations – Security Monkey

What is Security Monkey? Security Monkey is an OpenSource application from Netflix which monitors, alerts and reports one or multiple AWS accounts for anomalies. Security Monkey can run on an Amazon EC2 (AWS) instance, Google Cloud Platform (GCP) instance (Google Cloud Platform), or OpenStack (public or private cloud) instance. While Read more…

By Setu, 3 years2 years ago
Categories
  • Amazon Web Services
  • Cloud Penetration Testing
  • Cloud Security
  • Cloud Security Tools
  • Cloud Security Tutorial
  • Uncategorized
Recent Posts
  • AWS ReInvent19 – Security Announcements
  • AWS Reconnaissance Tools
  • PacBot – Open Source Compliance Automation Tool
  • Automated Remediation for CloudTrail Disruption
  • Shifting strategy from DevOps to DevSecOps
Hestia | Developed by ThemeIsle