#cloud
Read more stories on Hashnode
Articles with this tag
Learning "Kubernetes The Hard Way" project by Kelsey Hightower. · Background I've recently been working a lot more with Kubernetes across various...
In this path as a defender, you'll investigate a successful attack by using jq & Athena to analyze CloudTrail logs in JSON. · This is a walkthrough of...
What should you know as a cloud security engineer or for a cloud security interview? · A list of things to know as a cloud security engineer or for a...
In this path as an attacker, you’ll exploit your way through misconfigurations in Lambda (serverless functions) and containers in ECS Fargate. · This is...
Respond to an AWS security incident by analyzing cloud trail logs. · This is a walkthrough for "Bucket" by CyberDefenders Scenario Video...
Flaws.Cloud - Learn about common mistakes and gotchas when using Amazon Web Services (AWS) including S3, IAM, EC2, and more. · This is my walkthrough for...