News

In one interesting twist, the threat actors behind EleKtra-Leak were found to blacklist AWS accounts that habitually expose IAM credentials.
The AWS cloud's interface for creating IAM policies has always left a little bit to be desired. Although the interface works, it's a little bit messy and I have heard more than one person say that it ...
IT admins use group policies to manage user access via Active Directory, but AWS takes a subtly different approach, which can be exploited.
Cloud providers like Amazon Web Services (AWS) and Microsoft Azure have several options for IAM policies. The following are best practices to consider when using these platforms. 1) Protect the Root ...
Need to configure multiple AWS CLI credentials? This tutorial shows how to use AWS Configure for IAM account authentication.
Brien walks through the process of creating an IAM role for the AWS Fault Injection Simulator in order to find out what happens when an EC2 spot instance is interrupted.