It’s a new beginning! Ermetic is now Tenable Cloud Security.

Secure Your AWS EC2 Instance Metadata Service (IMDS)

Read this review of IMDS, an important AWS EC2 service component, to understand its two versions and improve your AWS security

Lior Zatlavi
By Lior Zatlavi Feb 27, 2023

How to Minimize Unintended Access and Achieve Least Privilege with Ermetic and AWS

Lior Zatlavi explains how to set up the platform in your environment and get maximum value

Lior Zatlavi
By Lior Zatlavi Jan 11, 2023

IAM Role Trust Update – What You Need to Know

When it comes to assuming roles, AWS is changing an aspect of how trust policy is evaluated; here is a quick digest of what this change may mean to you.

Lior Zatlavi
By Lior Zatlavi Oct 19, 2022

Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433

One of the most talked-about sessions at AWS re:Inforce, and my favorite, was IAM433, on AWS IAM’s internal evaluation mechanisms

Noam Dahan
By Noam Dahan Sep 29, 2022

Taking Notice of AWS IAM Roles Anywhere

IAM Roles Anywhere may be a pivotal moment for security — the new service lets you enrich the arsenal of tools at your disposal to improve your AWS security posture.

Lior Zatlavi
By Lior Zatlavi Aug 30, 2022

3 Ways to Reduce the Risk from Misused AWS IAM User Access Keys

Used incorrectly, AWS IAM User Access Keys can pose high risk; the good news is that great alternatives, explored here, exist

Lior Zatlavi
By Lior Zatlavi Aug 10, 2022

6 Tips for Successfully Securing Your AWS Environment

Top six actions and practices you can take to protect your AWS environment today.

Tenable Cloud Security
By Tenable Cloud Security May 25, 2022

Access Undenied on AWS

Introducing our new new open-source tool: Access Undenied on AWS. The tool parses AWS AccessDenied CloudTrail events, explains the reasons for them and offers actionable fixes.

Noam Dahan
By Noam Dahan Mar 20, 2022

Keep Your S3 Safe from CloudTrail Auditors

AWSCloudTrailReadOnlyAccess currently allows s3:GetObject for “*” and s3:ListAllMyBuckets – and reading CloudTrail logs may also give access to bucket object keys. BE CAREFUL!

Lior Zatlavi
By Lior Zatlavi Feb 03, 2022

Testing the Waters: First Impressions of CloudTrail Lake

Our first impressions of AWS's new managed audit and security lake that allows you to aggregate, immutably store, and query activity logs.

Noam Dahan
By Noam Dahan Jan 13, 2022

Tracking Adversaries in AWS using Anomaly Detection, Part 2

Going through the cyber “kill chain” with Pacu and using automated analysis to detect anomalous behavior

Lior Zatlavi
By Lior Zatlavi Jan 11, 2022

Tracking Adversaries in AWS using Anomaly Detection, Part 1

Minimizing the impact of a breach by identifying malicious actors’ anomalous behavior and taking action.

Lior Zatlavi
By Lior Zatlavi Jan 11, 2022
SEGA’s Saga of Nearly Compromised Credentials

SEGA’s Saga of Nearly Compromised Credentials

A look at VPNO’s recent findings of publicly accessible S3 buckets on SEGA’s infrastructure and what we can learn from it.

Lior Zatlavi
By Lior Zatlavi Jan 06, 2022
Protect Your AWS Environment Beyond Patching Log4j

Protect Your AWS Environment Beyond Patching Log4j

The crucial strategic lessons overlooked by enterprises dealing with the recently reported Log4j vulnerability.

Lior Zatlavi
By Lior Zatlavi Dec 29, 2021

Not Just Buckets: Are You Aware of ALL Your Public Resources?

A misconfiguration of resource based policies can inadvertently make resources public. Do you have such misconfigured policies present in your environment?

Lior Zatlavi
By Lior Zatlavi Nov 23, 2021

How Smart Secrets Storage Can Help You Avoid Cloud Security Risks

The not-so-sensitive locations that may tempt you when storing sensitive information -- why to avoid them and how

Lior Zatlavi
By Lior Zatlavi Nov 03, 2021

The Urgent Threat of Ransomware to S3 Buckets Due to Misconfigurations

Misconfigurations that can lead to S3 ransomware exposure and the mitigation tools you can leverage to prevent it

Lior Zatlavi
By Lior Zatlavi Oct 07, 2021
Five Strategies For Mitigating The S3 Ransomware Threat

Five Strategies for Mitigating Your S3 Misconfiguration Ransomware Threat

Detailed steps for better ransomware protection of your AWS environment

Lior Zatlavi
By Lior Zatlavi Oct 07, 2021

The AWS Shared Responsibility Model: Everything You Need to Know

What the Shared Responsibility model means, its many challenges & how to protect your cloud infrastructure.

Tenable Cloud Security
By Tenable Cloud Security Aug 02, 2021

AWS Resource Provisioning with Attribute Based Access Control (ABAC) – What You Need To Know

What to pay attention to when using ABAC in order to avoid unnecessary security gaps.

Lior Zatlavi
By Tenable Cloud Security Jul 19, 2021

AWS Condition Context Keys for Reducing Risk

A Least Privilege cheat sheet on using AWS global condition context keys to achieve least privilege.

Lior Zatlavi
By Lior Zatlavi May 25, 2021

Least Privilege Policy: Automated Analysis Trumps Native AWS Tools

AWS methods for granting & controlling access, plus native tools for detecting & repairing excessive permissions.

Lior Zatlavi
By Lior Zatlavi May 18, 2021

AWS’s Access Analyzer Preview Access is Great — But Is It Enough?

Learn the ins and outs of the preview access capability in Access Analyzer.

Lior Zatlavi
By Lior Zatlavi Mar 16, 2021

Keep Your IAM Users Close, Keep Your Third Parties Even Closer

An in-depth review on third-party access configuration and control with IAM permissions

Tenable Cloud Security
By Tenable Cloud Security Jan 28, 2021

Auditing IAM PassRole: A Problematic Privilege Escalation Permission

How to determine which identities need iam:PassRole to help enforce “use it or lose it” least-privilege.

Noam Dahan
By Noam Dahan Jan 13, 2021

The AWS Managed Policies Trap

The “AWS Managed Policies Trap” and how to escape using automated analysis of environment configuration and activity logs.

Tenable Cloud Security
By Tenable Cloud Security Dec 20, 2020

Who Holds the Keys to the Kingdom? (Part 2 of 2)

Part 2 takes a look at sensitive AWS Resources – secret strings and keys used in AWS.

Tenable Cloud Security
By Tenable Cloud Security Nov 25, 2020

Who Holds the Keys to the Kingdom? (Part 1 of 2)

Part 1 of a series takes a look at sensitive AWS Resources - secret strings and keys used in AWS.

Tenable Cloud Security
By Tenable Cloud Security Nov 15, 2020

AWS Identity Federation and Least Privilege – Friends or Foes?

How to address the challenges in basic and advanced implementations of AWS federation.

Ermetic Team
By Tenable Cloud Security Oct 07, 2020
Skip to content