CloudSecurity

How to configure AWS Identity Center to use Google Workspaces and Cloud Identities.

How to configure AWS Identity Center to use AzureAD

Building a successful cloud security program is more than just buying some tools. It's about understanding your business, defining your mission, and embracing your developers.
I deliberately published an Access Key and Secrets. Here's what happened.

At BSides Atlanta, I talked about how to handle an incident in AWS. The talk and this post are for those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.

It's 2021, time to revisit what you should do when setting up a new AWS Organization from scratch.