News

To help organizations embrace the principle of least privilege and building access policies that have fine-grained permissions, AWS announced a new feature for its IAM Access Analyzer tool called ...
Amazon’s AWS division clearly demonstrated at their recent re:Inforce event that security-based capabilities are the rock ...
Amazon Web Services is upping the ante on the security front with new and important changes for AWS and Identity and Access Management (IAM) users. Announcing the changes in a blog post published ...
This gap between AWS IAM user and group policies could be exploited by an attacker to take over accounts, delete group members, steal data and shut down services. Lightspin claimed its research ...
Brien walks through the process of creating an IAM role for the AWS Fault Injection Simulator in order to find out what happens when an EC2 spot instance is interrupted. I recently wrote a blog post ...
Keeping your Amazon account secure is a major concern for every AWS user and admin. Here are the top five AWS root user account best practices every organization should follow: Never share AWS root ...
Fido2 security keys like the YubiKey are now supported on AWS GovCloud (US region) – providing phishing-resistant MFA for all users. If you have a YubiKey and an AWS account in a standard AWS ...