Check out our latest blog series on AWS Best Practices on Logging!
Although CloudTrail is a well-trodden subject for AWS Security, there
were still a few interesting findings among a slice of our customer
base: Enable VPC flow logs: 81% of VPCs do no...
We've continued our blog series on AWS Best Practices, and just
. Although CloudTrail is a well-trodden subject for AWS Security, there
were still a few interest...
We just published another blog related to application risk from OAuth
applications: Who Do You Trust? Challenges with OAuth Application
Identity . This follows up on several other recent blogs related to
OAuth: Who Do You Trust? OAuth Client Applicat...
We just published A Real-World Look at AWS Best Practices: Networking,
part 6 of our AWS Best Practices series, looking closer at networking
configurations with NACLs and Security Groups with respect to inbound
access from the Internet to RDP and SSH...
In part 5 of our continuing series on AWS Best Practices, we cover
real-world stats on storage, specifically public access on buckets and
encryption of EBS volumes:
One of ...