Tales from the Cloud Trenches

Source In a recent threat hunt, Datadog Security Labs uncovered sophisticated attacker activity stemming from a leaked, long-term AWS access key (AKIA*). Within a mere 150-minute window, five distinct IP addresses were observed attempting to leverage this compromised key, executing various malicious techniques, tactics, and procedures (TTPs). This incident brought to light several previously unreported Read More …

The Key Benefits of Containers and Kubernetes for Organizations

Unlocking Efficiency Containers and Kubernetes offer numerous advantages for organizations, significantly enhancing application development and deployment processes. One of the primary benefits is agile application development, as containers simplify packaging and facilitate rapid deployment. This allows for frequent application builds, quick software releases, and granular rollbacks, ultimately improving top-line growth and customer experience. Another key Read More …

Tools – BlackCat: Azure Security Validation

For those stepping into the dynamic field of information security, staying abreast of new tools and methodologies is crucial. One such tool gaining traction, particularly for professionals working within Microsoft Azure environments, is “BlackCat.” Developed by ‘azurekid,’ BlackCat is a PowerShell module designed to help validate and enhance the security posture of Azure deployments. What Read More …

IAM – Identity and Access Management

Identity and Access Management (IAM) in Amazon Web Services (AWS) is a service that enables users to manage access to AWS resources securely. IAM allows organizations to control who can access specific resources, what actions they can perform, and under what conditions. This is crucial for maintaining security and compliance in cloud environments. Key Features Read More …

VPC – Virtual Private Cloud

A Virtual Private Cloud (VPC) in Amazon Web Services (AWS) is a logically isolated section of the AWS cloud where users can define and control a virtualized network environment. VPCs enable users to launch AWS resources, such as Amazon EC2 instances, within a virtual network that they define, providing enhanced security and control over their Read More …

ARN – Amazon Resource Name

An Amazon Resource Name (ARN) is a unique identifier used in Amazon Web Services (AWS) to specify resources across the AWS ecosystem. ARNs are essential for managing permissions and access control, as they allow users to precisely define which resources they are referring to in their policies and API calls. The structure of an ARN Read More …

AZ 900 – Part III – Microsoft Entra ID

Microsoft Entra ID Overview What is Microsoft Entra ID? Microsoft Entra ID, formerly known as Azure Active Directory (Azure AD), is a cloud-based identity and access management service provided by Microsoft. It enables organizations to manage user identities and access to resources securely. Key Features of Microsoft Entra ID Identity Management: User Lifecycle Management: Entra ID Read More …

AZ 900 – Part II – Architecture & Security II

Microsoft Azure is a powerful cloud computing platform that provides a wide range of services and resources for building, deploying, and managing applications and services through Microsoft-managed data centers. Understanding the structure of Azure is essential for effectively utilizing its capabilities. Key components of Azure’s organizational structure include subscriptions, management groups, resource groups, and resources. Read More …

AZ 900 – Part II – Architecture & Security I

Microsoft Azure is a comprehensive cloud computing platform that provides a wide range of services, including computing power, storage, networking, databases, analytics, and more. Understanding its global infrastructure involves several key concepts: Regions and Availability Zones Regions: Azure is divided into geographic regions, which are clusters of data centers located in specific areas around the Read More …

AZ 900 – Part I – Microsoft Azure Cloud Concepts

Microsoft Azure Cloud Concepts Cloud Service Models Types of Cloud Computing Benefits of the Cloud Fundamental characteristics of cloud computing Cloud computing offers convenient, on-demand access to your computing resources online. This has facilitated the move to remote work and supports collaboration wherever you are located. For IT teams, cloud services also make technological provisioning Read More …