Jeff MaleyDestination: AWS OrganizationsOr how to migrate isolated AWS accounts to an AWS OrganizationApr 18Apr 18
Jeff MaleyExpose a private service with AWS Verified AccessLet your private applications be public and also securedJan 21Jan 21
Jeff Maley5 Steps to Enforce DNS Query Logging in AWSMonitoring DNS queries is an often-overlooked part of logging. Understanding what resources your systems are looking for can provide…Oct 17, 2023Oct 17, 2023
Jeff MaleyData Perimeters in AWSWhere are the gateways to your data and how many of them are there?Jul 12, 2022Jul 12, 2022
Jeff Maley5 ways to immediately secure your AWS accountThe popularity and flexibility of AWS makes it an appealing target for malicious actors. Here are 5 ways that you can quickly lock your…Feb 21, 2022Feb 21, 2022
Jeff MaleyFour Ways to Encrypt your S3 Objects for Better Data SecurityData is an organization’s second most valuable asset and keeping it confidential is a priority. S3 has several ways to apply encryption…Jan 31, 2022Jan 31, 2022
Jeff MaleyFour Ways to Enforce Least Privilege in AWS for Better SecurityA common thread in data security incidents is over-privilege; eliminating too much access is critically important.Jan 12, 2022Jan 12, 2022