CloudSecurity
![Introducing the Universal Cloud Threat Model](/blog/uctm/FallingWater.jpeg)
Introducing the Universal Cloud Threat Model - a model anyone can use to cover 90% of the cloud attacks they may experience.
![Defining Security Invariants](/blog/security-invariants/oslo-akershus-night.jpeg)
Defining Security Invariants for safely leveraging Service Control Policies and Auto Remediation, with examples.
![Minimally Viable Cloud Governance](/blog/multicloud/akershus.jpeg)
Everyone has a preferred cloud provider and you probably govern that one pretty well. But like it or not, your organization is using the other providers and you need to govern them too. This blog post covers the minimum things to do in your non-preferred providers.
![Deploying AWS Backup](/blog/awsbackup/Viaden.jpeg)
How to leverage AWS Backup to protect you from account compromise and ransom attacks
![Leveraging AWS SSO (aka Identity Center) with Google Workspaces - version 2](/blog/aws-identity-center-google-v2/toronto.jpeg)
How to configure AWS Identity Center to use Google Workspaces and Cloud Identities.
![Leveraging AWS SSO (aka Identity Center) with Google Workspaces](/blog/aws-identity-center-google/StraitsofGibraltar.jpeg)
How to configure AWS Identity Center to use Google Workspaces and Cloud Identities.