AWS CloudTrail Best Practices (Checklist and Cheat Sheet)
Are you following CloudTrail best practices? Here’s a simple checklist ✅ Under the hood, AWS Security Hub service is looking for these best practices: ✅ [CloudTrail.1] CloudTrail…
Are you following CloudTrail best practices? Here’s a simple checklist ✅ Under the hood, AWS Security Hub service is looking for these best practices: ✅ [CloudTrail.1] CloudTrail…
Security Hub is a Cloud Security Posture Management (CSPM) service that you can use to perform security best practice checks, aggregate alerts, and enable automated…
Whether you’re actively trying to secure your AWS environments, you’re studying for the Certified Security Specialty exam, or you’re just curious and want to learn…
Understanding this isn’t required for the CompTIA Security+ exam, meaning that we’re going beyond the scope of this exam for a few minutes, but I…
There’s been a security incident in your organization. What do you do? Panic? No ;)! You follow an incident response process. In this article, we’re…
To control the flow of data in and out of your VPCs and Subnets in AWS, you can use Network Access Control Lists (NACLs), Security Groups…
In our course, we talk about Zero Trust and how it’s an approach that believes in continuously checking access and policy violations, even within internal…
We talked about ciphers and block ciphers in the prior post. A block cipher on its own would only ever encrypt a single block of…
When you’re using symmetric encryption you can use what’s known as either a stream cipher or a block cipher. They both ultimately encrypt your data,…
Most of us know that having visibility into our cloud accounts and resources is critical, but it can easily be overwhelming to implement. What should…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.