Tag: cloud security

AWS RDS Misconfigurations

Complete List of AWS RDS Misconfigurations

Amazon RDS manages your cloud and data backup, software patching, automatic failure detection, and recovery, which protects you and your organization from misconfigurations. Amazon Relational Database Service (Amazon RDS) is a web service that allows you to focus on your application and gives them the fast performance, high availability, security, ...

Reading Continue
AWS IAM Misconfigurations

A Complete List of AWS IAM Misconfigurations

Amazon Web Service’s (AWS) Identity and Access Management (IAM) permits you to manipulate and get entry to AWS offerings and sources securely. For example, using IAM, you may create and manipulate AWS customers and groups and use permissions to permit or deny their entry to AWS resources. IAM is a ...

Reading Continue
IAM in GCP

Implementing IAM in the Google Cloud Platform (GCP)

In this article, we will take a look at Identity Access Management or IAM in GCP (the Google Cloud Platform). First off, let us understand what IAM is. What is IAM? Identity Access Management (IAM) is a collective term that covers business policies, processes, technologies, and products that are used ...

Reading Continue
Building Secure S3 Buckets

How to Build A Secure S3 Bucket?

A few days ago, I searched for data breaches and leaks due to insecure S3 buckets on Google. Needless to say, I was blown away by the number of high-profile names on that list. Companies like FedEx, Verizon, Accenture, and even government organizations like the Pentagon. So in this article, ...

Reading Continue
A Complete List of AWS S3 Misconfigurations

A Complete List of AWS S3 Misconfigurations

Amazon S3 or Amazon Simple Storage Service is an AWS service where data and objects are stored. It is the most popular public cloud service that offers data availability, security, and performance. Both small and large businesses use this service. Unfortunately, AWS S3 bucket misconfigurations are one of the most ...

Reading Continue
Top-6-Azure-Virtual-Machine-(VM)-Misconfigurations-To-Avoid

Top 6 Azure Virtual Machine (VM) Misconfigurations To Avoid in 2021

This article will explore the top 6 most common Azure Virtual Machine (VM) misconfigurations you need to avoid in 2021.  What are Azure Virtual Machines? Azure offers many on-demand, scalable computing resources. Azure Virtual Machines (VM) is one of them. When you need more control over the computing environment, you ...

Reading Continue
Top 16 AWS S3 Misconfigurations To Avoid in 2021

Top 16 AWS S3 Misconfigurations To Avoid in 2021

Amazon S3 (Amazon Simple Storage Service) is an object storage service. It is the most popular public cloud service that offers data availability, security, and performance. It is used by both small and large businesses. To automatically monitor all your AWS resources for any security issues and potential exposure, AWS ...

Reading Continue
HIPAA Compliance Guide

HIPAA Compliance – A Comprehensive Guide

HIPAA stands for Health Insurance Portability and Accountability Act which was passed in 1996. HIPAA was also known as Kennedy -Kassebaum Act. This is a United States federal statute enacted by the 104th United States Congress and was signed into law in 1996 by then-President Bill Clinton. This law was ...

Reading Continue
AWS RDS Misconfigurations

Top 15 AWS RDS Misconfigurations To Avoid in 2021

In this blog post, we will take a look at the top 15 AWS RDS misconfigurations that you should avoid. Before getting started, let us brush up our knowledge on what AWS RDS is! We will be covering the below topics: What is AWS RDS? The 15 Common AWS RDS ...

Reading Continue
AWS IAM Misconfigurations

Top 6 AWS IAM Misconfigurations To Avoid in 2021

Introduction AWS Identity and Access Management (IAM) assigns granular AWS permissions to individuals and applications. Misconfiguration from AWS IAM has resulted in many high profile data breaches. When configured correctly, AWS is very secure. Still, it’s very easy to make a mistake in your configuration that will expose essential data ...

Reading Continue