Blog2020-03-08T12:55:55-05:00

The Overly Complex Way CloudTrail and CloudWatch Events Work Together

The Overly-Complex Way CloudTrail and CloudWatch Events Work Together One of the most vexing issues in my cloud journey has been understanding how CloudTrail and CloudWatch Events [...]

By |February 17th, 2020|

SSRF Defense Step 3: Eliminate Excessive IAM Data Access Permissions

SSRF Defense Step 3: Eliminate Excessive IAM Data Access PermissionsThe final guardrail in our SSRF Defense series is all about eliminating IAM policies with excessive data access permissions. For anyone [...]

By |October 15th, 2019|

SSRF Defense Step 2: Manage IAM Role Location Restrictions

SSRF Defense Step 2: Manage IAM Role Location Restrictions The second guardrail in our SSRF Defense series is all about managing IAM role location restrictions. For anyone new to [...]

By |October 3rd, 2019|

What You Need to Know About AWS Security Monitoring, Logging, and Alerting

What You Need to Know About AWS Security Monitoring, Logging, and Alerting In terms of AWS security, first the good news: Amazon Web Services offers an impressive collection of [...]

By |August 26th, 2019|

Build Your Own Multi-Cloud Security Monitoring in 30 Minutes or Less with StreamAlert

One of the most difficult problems in cloud security is building comprehensive multi-account/multi-cloud security monitoring and alerting. I’d say maybe 1 out of 10 organizations I assess or work [...]

By |July 16th, 2019|

The 3-Step Process to Start Monitoring Your AWS Cloud Environments

The 3-Step Process to Start Monitoring Your AWS Cloud Environments The following recommendations will help you outline a path to setting up a proper monitoring program for your AWS instances [...]

By |June 13th, 2019|

AWS vs. Azure vs. GCP: A Security Pro’s Quick Cloud Comparison

The Security Pro's Quick Cloud Comparison: AWS, Azure, or GCP? Over the past year I've noticed a very large uptick in production workloads, often from large organizations, moving beyond [...]

By |June 12th, 2019|

So, You Want to Start Monitoring Your AWS Account?

So, You Want to Start Monitoring Your AWS Account? Before implementing an AWS monitoring solution, address “What” and “Why”. Before we jump into our recommendations for best practices for monitoring [...]

By |June 11th, 2019|

The Top 3 Reasons for Utilizing a Cloud Management Platform

The Top 3 Reasons for Utilizing a Cloud Management Platform Before implementing an AWS monitoring solution, address the “Whats” and “Whys”. An IT department gains many advantages by using the [...]

By |June 6th, 2019|

The Top 10 Most Commonly Used Guardrails for Automating Routine Monitoring Tasks

The Top 10 Most Commonly Used Guardrails for Automating Routine Monitoring Tasks These are our top 10 most requested or frequently run ops that help our customers automate the routine [...]

By |June 4th, 2019|

Cloud Security CoE Organizational Models

In the first post of our Cloud Security Center of Excellence series we covered the two critical aspects of being successful at cloud security: accountability and empowerment. Without accepting accountability to secure [...]

By |April 9th, 2019|
Go to Top