Socials
  • 1-234-564-3773
  • [email protected]
Cloud Security OperationsCloud Security Operations
  • Home
  • Services
  • Blog
  • Contact Us

Uncategorized

Uncategorized

AWS ReInvent19 – Security Announcements

I didn’t attend any AWS reInvent or reInforce conferences to date, however, I never missed any AWS reInvent Security Announcements !! Even this year I watched the reinvent sessions and keynotes while relaxing at home with some popcorn and drinks 😀 Major announcements for Identity, Security, and Governance during this Read more…

By Setu, 3 years3 years ago
Uncategorized

Automated Remediation for CloudTrail Disruption

What is CloudTrail and how can it be disrupted? With AWS CloudTrail, you can monitor your AWS deployments in the cloud by getting a history of AWS API calls for your account, including API calls made via the AWS Management Console, the AWS SDKs, the command line tools, and higher-level AWS services. Read more…

By Setu, 4 years4 years ago
devsecops introduction by cloudsecops
Uncategorized

Shifting strategy from DevOps to DevSecOps

Shifting strategy from DevOps to DevSecOps An introduction to the devsecops and the strategy for implementing DevSecOps culture is presented by Setu Parimi on 29th July 2018. It’s a session focussed on a high-level overview of devsecops which will be followed by intermediate and advanced level sessions in future. Agenda: -DevSecOps Introduction Read more…

By Setu, 4 years4 years ago
Auditing AWS Environments for HIPAA Compliance
Cloud Security

Auditing AWS Environments for HIPAA Compliance

Introduction CloudSploit is an AWS compliance, security and configuration monitoring scanner which is the first of its kind. It is an open source project designed to detect security risks in AWS. The CloudSploit Scans is built on NodeJS script which works on two phases. Collection and Scanning. After a successful run, Read more…

By Setu, 4 years4 years ago
aws_ir-cloudsecops
Cloud Penetration Testing

AWS Incident Response- AWS IR and Margarita Shotgun

AWS Incident Response In this post, we will be talking about the ways one can set up and automate a set of functions that need to be carried out in a sequence in case an attack happens in AWS,  Yes! AWS Incident response. Having the whole infrastructure on the cloud Read more…

By Setu, 4 years4 years ago
Uncategorized

Protected: Internship Program

There is no excerpt because this is a protected post.

By Setu, 4 years2 years ago
Subscribe

Always be the first to know news related to Cloud Security. We will never spam you.

Categories
  • Amazon Web Services
  • Cloud Penetration Testing
  • Cloud Security
  • Cloud Security Tools
  • Cloud Security Tutorial
  • Open Policy Agent
  • Uncategorized
Recent Posts
  • Deny Unauthorized ConfigMap Volumes – OPA Gatekeeper Pod Security Guardrail (Part 3)
  • Deny Host Network – OPA Gatekeeper Pod Security Guardrail (Part 2)
  • Restrict Wildcards in RBACs – OPA Gatekeeper RBAC Guardrail (Part 3)
  • Restrict RBAC Admins – OPA Gatekeeper RBAC Guardrail (Part 2)
  • Restrict Service Account Namespace – OPA Gatekeeper RBAC Guardrail (Part 1)
Hestia | Developed by ThemeIsle