DEV Community

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

4
Comments
4 min read
AWS IAM Users and Roles in the context of Zero Trust Security Framework

AWS IAM Users and Roles in the context of Zero Trust Security Framework

Comments
3 min read
Here's how to pick a SIEM: Cloud-focused tools, uses, and pros/cons from my experience

Here's how to pick a SIEM: Cloud-focused tools, uses, and pros/cons from my experience

Comments
4 min read
Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Are We Doing Enough to Stay Ahead of Cybersecurity Threats in 2025?

Comments
1 min read
Cloud Security Fundamentals: Multi-Platform Protection Strategies

Cloud Security Fundamentals: Multi-Platform Protection Strategies

1
Comments 1
3 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗔𝘇𝘂𝗿𝗲 𝗦𝗲𝗰𝗿𝗲𝘁𝘀

𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗔𝘇𝘂𝗿𝗲 𝗦𝗲𝗰𝗿𝗲𝘁𝘀

5
Comments
1 min read
AI and Attorney-Client Privilege: Hidden Cloud Risks and How to Keep Confidentiality Safe

AI and Attorney-Client Privilege: Hidden Cloud Risks and How to Keep Confidentiality Safe

1
Comments
4 min read
Fantastic AWS Policies and Where to Find Them

Fantastic AWS Policies and Where to Find Them

2
Comments 1
9 min read
Design and Implement Role-Based Access with AWS IAM

Design and Implement Role-Based Access with AWS IAM

Comments
7 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

🔐 Azure Security Deep-Dive: From Quiz Questions to Real-World Cloud Implementations (with Code)

Comments
4 min read
Understanding Zero Trust: The Future of Cyber security

Understanding Zero Trust: The Future of Cyber security

3
Comments
3 min read
Stop, Review, Release: Email Holding in M365

Stop, Review, Release: Email Holding in M365

1
Comments
2 min read
Fixing “Service Account Key Creation is Disabled” in Google Cloud

Fixing “Service Account Key Creation is Disabled” in Google Cloud

Comments
2 min read
#DAY 3: The Cloud Brain

#DAY 3: The Cloud Brain

4
Comments
4 min read
Configuring Secure Access to Workloads with Azure Virtual Networking Services

Configuring Secure Access to Workloads with Azure Virtual Networking Services

6
Comments
2 min read
How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

49
Comments
4 min read
Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)

Step-by-Step: Creating a VPC, Subnet & Gateway on AWS (Beginner-Friendly)

2
Comments 7
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

🔐 Mastering AWS IAM: How to Control EC2 Access Like a Pro [Part-5]

Comments
4 min read
🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

🛡️ Zero Trust for File Uploads in S3: Protecting Amazon S3 with Trend Micro FSS

7
Comments 1
3 min read
Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

Enhancing S3 Security: My Journey from ClamAV to GuardDuty Malware Scanning

1
Comments
4 min read
How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

How to Secure Your AWS Web Application with Data Sovereignty, Encryption, and Availability in a Multi-Account Setup.

1
Comments
4 min read
Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Unlocking AWS Potential: 18 Must-Have Resources for Cloud Enthusiasts

Comments
6 min read
loading...