This week's articles
Building a Data Perimeter on AWS
#aws, #defend, #design
Paper outlining the best practices and available services for creating a perimeter around your identities, resources, and networks in AWS.
Tools That Use AWS Logs to Help with Least Privilege
#aws, #build
This article explores a few tools that use AWS logs to help you create least privilege policies. Getting to the right policies can be an ongoing game of whack-a-mole and no tool can generate perfect policies with no effort. They all require you to put thought into your approach and do last-mile tweaking but they can help with the toil.
Azure Synapse Security Advisory - Orca Security
#attack, #azure
Orca Security issued a security advisory to address hazards in the use of the Microsoft Azure Synapse service. It is believef the tenant separation in this service is insufficiently robust to protect secrets against other tenants.
|