Abhiramcloudbuddy.hashnode.dev·Nov 17, 2024Ensuring Compliance in a Shared Responsibility ModelIn today's cloud-first world, organizations are increasingly adopting cloud-based solutions to enhance their operations. However, this shift brings forth a unique challenge: shared responsibility for security. While cloud providers are responsible fo...Discusscloud compliance
Tanishka Marrottcloud-design-diaries.hashnode.dev·Oct 18, 2024AWS Config: An Architect's Guide to Cloud Governance and ComplianceAs an architect, ensuring the smooth functioning of your cloud infrastructure while maintaining compliance and security is paramount. AWS Config is one of those hidden gems that can help you achieve this, not just through monitoring and reporting but...Discuss·1 likeAWS
Abhiramcloudbuddy.hashnode.dev·Sep 6, 2024Zero Trust for Critical Infrastructure: A Comprehensive GuideCritical infrastructure, such as power plants, water treatment facilities, and transportation networks, is essential for the functioning of modern societies. However, these systems are increasingly vulnerable to cyberattacks, making it imperative to ...Discusszero trust security
Abhiramcloudbuddy.hashnode.dev·Aug 25, 2024CSPM and Risk Management: A Powerful CombinationCloud Security Posture Management (CSPM) is a critical component of a comprehensive cloud security strategy. By providing visibility into cloud environments, identifying vulnerabilities, and ensuring compliance with security best practices, CSPM play...Discusscspm
Azhar Hussainblog.azharhussain.net·Aug 8, 2024Understanding Cloud Infrastructure-Core Components and Infrastructure as Code (IaC)As cloud computing becomes an integral part of modern software development, understanding cloud infrastructure is crucial for anyone looking to harness the full potential of the cloud. Cloud infrastructure forms the backbone of cloud services, enabli...Discuss·4 likes·783 readsCloud Computing 101cloud compute
Lars KampforFix Security Blogfix.security·Aug 8, 2024Harden security posture with cloud taggingCloud tags are foundational component of good cloud hygiene and can serve many different use cases such as governance, cloud cost, security, and compliance. In this blog post, I'll provide a brief overview of the benefits of implementing a tagging po...Discuss·150 readsCloud securitycloud native
Abhiramcloudbuddy.hashnode.dev·Aug 3, 2024Cloud Native Security Compliance and RegulationsIntroduction The cloud has revolutionized the way businesses operate, offering unprecedented scalability and agility. However, it also introduces unique security challenges. Adhering to a complex regulatory landscape is essential for organizations op...Discusscloud native
Lukas LöscheforFix Security Blogfix.security·Aug 1, 2024Launch Week Day 4: New inventory dashboardManaging and securing cloud infrastructure can be a daunting task. With resources spread across various regions and accounts, getting the complete picture of your cloud environment is difficult or outright impossible. As organizations adopt multi-clo...Discuss·63 readsProductlaunch week
Lars KampforFix Security Blogfix.security·Jul 31, 2024Launch Week Day 3: Inventory and compliance historyToday, we're announcing our History capability for your cloud inventory and compliance status. With Fix, you can now track five different events for your cloud resources over time: created, updated, deleted, compliant, and vulnerable. Traditional sec...Discuss·45 readsProductcspm
Lars KampforFix Security Blogfix.security·Jul 30, 2024Launch Week Day 2: Ensure cloud complianceStaying compliant is hard, especially in a dynamic cloud-native environment, where resource configurations can change all the time. With Fix, you can now continuously assess your compliance posture across your cloud accounts and resources for the ISO...Discuss·58 readsProductcloud compliance