Hrushikesh Kakade
TheSecurityEngineer's Blog

TheSecurityEngineer's Blog

Follow
Follow
homeAWS SecurityAbout meBuy me a coffeebadgesnewsletter
Tag

Security

#security

More content

Read more stories on Hashnode


Articles with this tag

Stop sharing plaintext secrets with your colleagues

Mar 20, 20223 min read

Implement a secure way to share sensitive data within the Organization · There are times when you have to share sensitive information with your...

Stop sharing plaintext secrets with your colleagues

Implement SCP to enforce IAM user tagging

Mar 3, 20223 min read

Whenever an IAM user is created, it's best if it is tagged. The reason is simple... It gives more information about the user. One of the use-cases for...

Implement SCP to enforce IAM user tagging

Implement AWS IAM Least Privilege at scale

Feb 20, 20227 min read

Maintain least privilege access every day! · Creating an AWS IAM user is a common activity to access the AWS resources. Most often, the IAM user created...

Implement AWS IAM Least Privilege at scale

Enforce MFA to AWS IAM users

Feb 4, 20228 min read

Ensure secure authentication by attaching a policy to enforce MFA to IAM users · Welcome to yet another blog post, where we learn how to enforce...

Enforce MFA to AWS IAM users

Automate AWS Security at scale: AWS events real-time alerts

Jan 29, 20229 min read

Get real-time alerts whenever an important AWS service is changed · Welcome to yet another blog post from the series "AWS security at scale". In this...

Automate AWS Security at scale: AWS events real-time alerts

Automate Deactivation of Dormant AWS IAM Users

Jan 16, 202211 min read

A blog on how to deactivate dormant IAM users by implementing Security at scale. · Overview It often happens that the employees create AWS IAM users to...

Automate Deactivation of Dormant AWS IAM Users