AWS Security Best Practice #4: Use Roles for EC2

By now, you're getting the theme that security on AWS is all about being proactive. The point of proactive security is...

AWS Announces Important AWS Security Maintenance Advisory

IMPORTANT ANNOUNCEMENTAWS has released an important announcement about a Xen hypervisor security advisory that requires...

AWS Security Best Practice #3: Reduce IAM Users with Admin Rights

Based on the last two posts, you have disabled your AWS root user; removed any root keys, assigned an MFA to that user,...

AWS Security Best Practice #2: Enable MFA Tokens Everywhere

Here we are, a week later and now following up on to the second installment of our recommended Top Ten Security Best...

AWS Security Best Practices #1: Disable Root Account API Access Key

Today, we kick off a series on the top 10 security best practices we've come across based on our own experiences. As AWS...

AWS Security How-To: Protecting CloudTrails Data

When attackers breach your network, their first priority is to get their meat-hooks into your organization without being...

Managing 3rd Party Access to your AWS Accounts

Signing up for cloud-based SaaS services to go along with your shiny new AWS account is an eventuality. From security to...

GHOSTbusting in AWS

Earlier this week, CVE-2015-0235 was unveiled, exposing a vulnerable set of common calls in the glibc library....

Avoiding the Top 5 Most Common AWS Security Risks

According to IBM’s 2014 Cyber Security Intelligence Index, 95% of all security incidents involve human...

Implementing AWS IAM Best Practices is Your Responsibility

If you find yourself worried at night when you go to sleep whether you've properly secured your AWS IAM users or API...

Why Azure’s Moves Matter

Azure announced a series of new features and technologies that actually moved the needle in their battle to...

Cloud Services Killed the Server… Again

I've often stared deep into the eyes of a colleague when I mutter the words "services killed the server". Not because I...