Socials
  • 1-234-564-3773
  • [email protected]
Cloud Security OperationsCloud Security Operations
  • Home
  • Services
  • Blog
  • Contact Us

Cloud Security

Amazon Web Services

AWS Security Use Cases & Automations

AWS Security Automation Security automation is the automatic handling of a task in a script or machine based security application  that would otherwise be done manually by a cybersecurity professional. AWS Security Automation is  automating your AWS testing tasks like scanning, enumeration,  that would save time and workload of security Read more…

By Setu, 4 years4 years ago
aws pentesting
Cloud Penetration Testing

Post Exploitation in AWS using Nimbostratus

Introduction Nimbostratus is a tool developed by Andres Riancho for fingerprinting and exploiting Amazon cloud infrastructures. Nimbostratus uses any application level HTTP proxy vulnerability to enumerate the instance and credentials from the metadata service which is available to all the instances in EC2. This tool-set can be tested on nimbostratus-target, Read more…

By Setu, 4 years4 years ago
cloudsecops-cloudsecurity
Amazon Web Services

Security audit using Cloud Custodian for compliance in AWS

Introduction In this article, we will be talking about Cloud Custodian, an open source rules engine for fleet management in AWS. The simple YAML DSL allows you to easily define rules to enable a well-managed cloud infrastructure, that’s both secure and cost optimized. Cloud Custodian unifies the dozens of tools Read more…

By Setu, 4 years4 years ago
aws_ir-cloudsecops
Cloud Penetration Testing

AWS Incident Response- AWS IR and Margarita Shotgun

AWS Incident Response In this post, we will be talking about the ways one can set up and automate a set of functions that need to be carried out in a sequence in case an attack happens in AWS,  Yes! AWS Incident response. Having the whole infrastructure on the cloud Read more…

By Setu, 4 years4 years ago

Posts navigation

Previous 1 2 3
Subscribe

Always be the first to know news related to Cloud Security. We will never spam you.

Categories
  • Amazon Web Services
  • Cloud Penetration Testing
  • Cloud Security
  • Cloud Security Tools
  • Cloud Security Tutorial
  • Open Policy Agent
  • Uncategorized
Recent Posts
  • Deny Unauthorized ConfigMap Volumes – OPA Gatekeeper Pod Security Guardrail (Part 3)
  • Deny Host Network – OPA Gatekeeper Pod Security Guardrail (Part 2)
  • Restrict Wildcards in RBACs – OPA Gatekeeper RBAC Guardrail (Part 3)
  • Restrict RBAC Admins – OPA Gatekeeper RBAC Guardrail (Part 2)
  • Restrict Service Account Namespace – OPA Gatekeeper RBAC Guardrail (Part 1)
Hestia | Developed by ThemeIsle