CIEM – Cloud Infrastructure Entitlement Management

The landscape of IT has evolved from a few on-premises servers to a complex, multi-cloud reality. The old security mantra of “build a strong perimeter” is a relic of the past. Today, our biggest security challenges are no longer about keeping threats out but about managing who has access to what, and how much access Read More …

Building Cloud Security

I’ve seen our security mindset evolve from building a fortress around a data center to securing a border less, multi-layered cloud environment. The old approach of using fragmented, point-in-time tools is no longer tenable. To effectively protect modern cloud infrastructure, you must understand its layers and adopt a cohesive, layered security strategy. Think of your Read More …

Invictus :: Profiling TraderTraitor

TraderTraitor, a DPRK-nexus threat actor known for state-sponsored financial gain to fund North Korea’s nuclear weapons programs and engage in espionage. TraderTraitor primarily targets AWS environments, the cryptocurrency industry, and adjacent financial sectors through supply chain compromise, credential theft, and cloud service abuse. They are responsible for major crypto heists, including $625 million from the Read More …

Wiz Research : Current Cloud Exposure Trends

Wiz Research presented key findings from their “Cloud Data Security Snapshot: Current Exposure Trends” report, which analyzed numerous cloud environments for data exposure risks. A major revelation is that sensitive data frequently lies “hiding in plain sight,” with 54% of cloud environments exposing virtual machines and server-less instances containing sensitive information like PII, and 35% Read More …

Navigating the Kubernetes Threat Landscape

The escalating adoption of Kubernetes and containerized assets has introduced complex security challenges, making anomaly detection difficult due to their highly dynamic nature. Microsoft Threat Intelligence reveals a concerning trend: attackers are increasingly exploiting unsecured workload identities to infiltrate these environments. A striking 51% of workload identities were inactive in the past year, representing a Read More …

Uber’s Multi-Cloud Secrets Management

In the article “Building Uber’s Multi-Cloud Secrets Management Platform,” Uber discusses its approach to managing sensitive information, known as “secrets,” across various cloud environments. For someone new to IT, it’s important to understand that secrets can include passwords, API keys, and other confidential data that applications need to function securely. Uber faced challenges in ensuring Read More …

Key Use Cases for Containers and Kubernetes

Containers and Kubernetes serve various use cases that enhance application development and deployment. One prominent use case is microservices architecture, where independent and loosely coupled application components are orchestrated effectively. Containers and Kubernetes provide a robust foundation for microservices, enabling scaling, self-healing, and service isolation. Additionally, containers act as enablers for DevOps practices by facilitating Read More …

AZ 900 Study Guide

Core Concepts Describe Cloud Concepts – What is the cloud? Describe Azure Architecture & Services – What services are there? Describe Azure Management & Governance – How you can manage things. In simpler terms, cloud computing uses a network to connect users to a cloud platform where they request and access rented computing services.   Read More …

Navigating the Challenges of Containers and Kubernetes Deployment

Containers and Kubernetes present several limitations and challenges that organizations must consider. One significant issue is platform complexity. While these technologies are versatile, they are not always necessary for every application. For instance, using Kubernetes to orchestrate static Commercial Off-The-Shelf (COTS) applications can be excessive, as the complexity of Kubernetes may outweigh any potential business Read More …

Notes – AWS Firewall policies

In AWS, AWS Network Firewall policies control firewall rules, defining the monitoring and protection behavior for a firewall by using rule groups and policy default settings. Here’s a more detailed explanation: Firewall Policy: This defines the monitoring and protection behavior for a firewall, specifying how traffic is handled. Rule Groups: These are collections of rules that define the Read More …