What is AWS Config Every time you’re reading about yet another unprotected S3 bucket that has leaked, you’re probably wondering how is it possible to let this happen. When your AWS footprint gets bigger, it gets more difficult to keep track of all your AWS resources. You might have multiple AWS accounts, making it even […]
AWS Users and Roles can have their permissions limited by a Permission Boundary. The effective permissions are at the intersection of the user or role policy and the permission boundary (which is also defined as an IAM policy). One of the use-cases of using Permission Boundaries is to restrict external access of your AWS users […]
Employees typically get a laptop or workstation to do their work. Contractors use their own laptops or workstations in most cases. This brings all kinds of challenges on how to manage and secure these. In small and medium companies there is often no time or resources to ensure the laptop is and stays secure. When […]