News

Amazon Web Services is upping the ante on the security front with new and important changes for AWS and Identity and Access Management (IAM) users. Announcing the changes in a blog post published ...
This gap between AWS IAM user and group policies could be exploited by an attacker to take over accounts, delete group members, steal data and shut down services. Lightspin claimed its research ...
They also performed other reconnaissance actions by calling ListUsers to gather a list of IAM users in the AWS account and ListBuckets to identify all the existing S3 buckets. In the compromised ...
"For AWS users, Datadog supports two mechanisms of integration. As you update AWS integration credentials we strongly encourage the use of AWS IAM Role Delegation. This stronger method of AWS ...
Cloud providers like Amazon Web Services (AWS) and Microsoft Azure have several options for IAM policies. The following are best practices to consider when using these platforms. When a cloud account ...
The AWS cloud's interface for creating IAM policies has always left a little bit to be desired. Although the interface works, it's a little bit messy and I have heard more than one person say that it ...
When AWS detects this exposure, we automatically apply a policy to quarantine the IAM user with the compromised credentials to drastically limit the actions available to that user, and we notify ...
Keeping your Amazon account secure is a major concern for every AWS user and admin. Here are the top five AWS root user account best practices every organization should follow: Never share AWS root ...
Brien walks through the process of creating an IAM role for the AWS Fault Injection Simulator in order to find out what happens when an EC2 spot instance is interrupted. I recently wrote a blog post ...