๐ Stories, Tutorials & Articles

boostsecurity.io
This article is part of a series about the security of the software supply chain. Each article will be analyzing a component of the Supply chain Levels for Software Artifacts (SLSA) model in depth, from the developerโs workstation all the way to the consumer side of the chain.

www.mitiga.io
A recent Mitiga Research Team investigation found the well-regarded Amazon Relational Database Service is leaking PII via exposed RDS Snapshots.

medium.com
Using Kube-bench (checks performed to determine Kubernetes is deployed securely) and Kubescape (an open source tool that includes risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning) integrated in Github Actions.

infosec.rodeo
IAM was designed to manage authentication and authorization in a single AWS account. As adoption of the cloud grew, organizations started to identify the need for using multiple AWS accounts.
Instead of refactoring the architecture, AWS did what AWS does best - it built a new service.

towardsaws.com
There are many tools available today that are designed to automate security checks. But some people rely too much on tools, as if conducting an AWS security assessment is the same as formatting the scannerโs output into fancy-looking report.
This blog post focuses on what scanners are missing and why tools cannot fully replace the assessor.