
How to perform an IAM Security Audit in AWS
A step by step guide to show how a security audit of AWS IAM can be performed to identify users attributes like unrotated keys, IAM password policies, access and much more.
A step by step guide to show how a security audit of AWS IAM can be performed to identify users attributes like unrotated keys, IAM password policies, access and much more.
A guide on deploying your first (or second, or third or …) application from a code repository to a server via the awesome GitHub Actions workflow.
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
A security audit allows you to collect information about a system which can then be analysed to identify if there are security weaknesses. This article describes how you can perform a security audit of your Mongo Cloud account.
CloudTrail is a service offered by AWS to monitor and record all actions taken within an AWS account. This article describes how you can get started with AWS CloudTrail to monitor for security sensitive APIs.
Developers may sometimes, accidentally or due to the lack of security knowledge, store secrets, keys or passwords within code repositories. These may then get leaked over the Internet, resulting in attackers taking over accounts or accessing sensitive information. This article describes how you can scan your Github org repos for secrets.