Socials
  • 1-234-564-3773
  • [email protected]
Cloud Security OperationsCloud Security Operations
  • Home
  • Services
  • Blog
  • Contact Us

Amazon Web Services

Cloud Security Tools

Automating Container Security Scanning using AWS CodeBuild and Snyk

Introduction In a usual DevOps pipeline process, the idea of security comes quite late in the process, right before the deployment. Security testing at this point has a major issue. The problem is that in many cases apart from the small security bugs that show up, a lot of serious Read more…

By Vishal, 1 year1 year ago
Cloud Penetration Testing

AWS Reconnaissance Tools

Hi all, In this post, we will discuss the various AWS Reconnaissance Tools used to recon and exploit AWS cloud accounts. Let’s first look at the reasons due to which credentials get exposed: Vulnerabilities in AWS hosted applications like SSRF (Server Side Request Forgery) and LFI (Local File Inclusion) Code Read more…

By Setu, 3 years3 years ago
cloudsecops-aws-post-exploitation
Amazon Web Services

AWS Post Exploitation – Part 1

What is AWS Post exploitation? Post exploitation is required when you’ve successfully compromised a particular target. The purpose of the AWS Post Exploitation phase is to determine the value of the account compromised and to maintain control of the account for later use. The value of the account is determined by Read more…

By Setu, 4 years4 years ago
Amazon Web Services

AWS Security Use Cases & Automations

AWS Security Automation Security automation is the automatic handling of a task in a script or machine based security application  that would otherwise be done manually by a cybersecurity professional. AWS Security Automation is  automating your AWS testing tasks like scanning, enumeration,  that would save time and workload of security Read more…

By Setu, 4 years4 years ago
cloudsecops-cloudsecurity
Amazon Web Services

Security audit using Cloud Custodian for compliance in AWS

Introduction In this article, we will be talking about Cloud Custodian, an open source rules engine for fleet management in AWS. The simple YAML DSL allows you to easily define rules to enable a well-managed cloud infrastructure, that’s both secure and cost optimized. Cloud Custodian unifies the dozens of tools Read more…

By Setu, 4 years4 years ago
cloud security
Amazon Web Services

Automated Monitoring for Security Misconfigurations – Security Monkey

What is Security Monkey? Security Monkey is an OpenSource application from Netflix which monitors, alerts and reports one or multiple AWS accounts for anomalies. Security Monkey can run on an Amazon EC2 (AWS) instance, Google Cloud Platform (GCP) instance (Google Cloud Platform), or OpenStack (public or private cloud) instance. While Read more…

By Setu, 4 years4 years ago
Subscribe

Always be the first to know news related to Cloud Security. We will never spam you.

Categories
  • Amazon Web Services
  • Cloud Penetration Testing
  • Cloud Security
  • Cloud Security Tools
  • Cloud Security Tutorial
  • Open Policy Agent
  • Uncategorized
Recent Posts
  • Deny Unauthorized ConfigMap Volumes – OPA Gatekeeper Pod Security Guardrail (Part 3)
  • Deny Host Network – OPA Gatekeeper Pod Security Guardrail (Part 2)
  • Restrict Wildcards in RBACs – OPA Gatekeeper RBAC Guardrail (Part 3)
  • Restrict RBAC Admins – OPA Gatekeeper RBAC Guardrail (Part 2)
  • Restrict Service Account Namespace – OPA Gatekeeper RBAC Guardrail (Part 1)
Hestia | Developed by ThemeIsle