Five Strategies For Mitigating The S3 Ransomware Threat

Five Strategies for Mitigating Your S3 Misconfiguration Ransomware Threat

Detailed steps for better ransomware protection of your AWS environment

Lior Zatlavi By Lior Zatlavi

The AWS Shared Responsibility Model: Everything You Need to Know

What the Shared Responsibility model means, its many challenges & how to protect your cloud infrastructure.

Ermetic Team By Ermetic Team

AWS Resource Provisioning with Attribute Based Access Control (ABAC) – What You Need To Know

What to pay attention to when using ABAC in order to avoid unnecessary security gaps.

Lior Zatlavi By Ermetic Team

AWS Condition Context Keys for Reducing Risk

A Least Privilege cheat sheet on using AWS global condition context keys to achieve least privilege.

Lior Zatlavi By Lior Zatlavi

The Battle for Least Privilege Policy: Why Automated Analysis Trumps Native AWS Tools

AWS methods for granting & controlling access, plus native tools for detecting & repairing excessive permissions.

Lior Zatlavi By Lior Zatlavi

AWS’s Access Analyzer Preview Access is Great — But Is It Enough?

Learn the ins and outs of the preview access capability in Access Analyzer.

Lior Zatlavi By Lior Zatlavi

Keep Your IAM Users Close, Keep Your Third Parties Even Closer – Part 1

Part 1 on third-party access configuration and control, and how it can go sideways with IAM permissions.

Ermetic Team By Ermetic Team

Keep Your IAM Users Close, Keep Your Third Parties Even Closer – Part 2

Part 2 explores best practices against third-party access risk and how automated analysis can help.

Ermetic Team By Ermetic Team

Auditing PassRole: A Problematic Privilege Escalation Permission

How to determine which identities need iam:PassRole to help enforce “use it or lose it” least-privilege.

Noam Dahan By Noam Dahan

The AWS Managed Policies Trap

The “AWS Managed Policies Trap” and how to escape using automated analysis of environment configuration and activity logs.

Ermetic Team By Ermetic Team

Who Holds the Keys to the Kingdom? (Part 2 of 2)

Part 2 takes a look at sensitive AWS Resources – secret strings and keys used in AWS.

Ermetic Team By Ermetic Team

Who Holds the Keys to the Kingdom? (Part 1 of 2)

Part 1 of a series takes a look at sensitive AWS Resources - secret strings and keys used in AWS.

Ermetic Team By Ermetic Team

AWS Identity Federation and Least Privilege – Friends or Foes?

How to address the challenges in basic and advanced implementations of AWS federation.

Ermetic Team By Ermetic Team