Open in app

Sign In

Write

Sign In

Seshu Pasam
Seshu Pasam

46 Followers

Home

About

Pinned

AWS Governance — Service Control Policies

AWS Organizations and Service Control Policies (SCP) play a crucial role in security, compliance and governance. Back in the day, various environments (dev, test, production, etc.) were cluttered within a single AWS account. AWS Control Towner (Landing Zone) and AWS Organizations made it easy to build accounts that are specific…

AWS

15 min read

AWS Governance — Service Control Policies
AWS Governance — Service Control Policies
AWS

15 min read


Pinned

CWPP — Agents, Agentless or Hybrid?

Cloud Workload Protection Platform (CWPP) is a security solution to protect compute workloads like Virtual Machines (VM), containers and serverless resources running in the cloud. It provides security teams visibility into compute resources and monitors for anomalous behavior, malicious activity, unauthorized access, vulnerabilities, secrets, compliance and configuration posture, etc. There…

Cwpp

6 min read

CWPP — Agents, Agentless or Hybrid?
CWPP — Agents, Agentless or Hybrid?
Cwpp

6 min read


Feb 19

Review: CloudTrail Lake Integrations

AWS CloudTrail provides audit capabilities for risk, governance and compliance. CloudTrail Lake (CTL) provides ability to query the audit events using SQL. Recently AWS released a new feature to ingest external audit data into CTL using PutAuditEvents API. Data is stored as immutable ORC files for up to 7 years…

Cloudtrail Lake

4 min read

Review: CloudTrail Lake Integrations
Review: CloudTrail Lake Integrations
Cloudtrail Lake

4 min read


Feb 8

SIEM/SOAR — Red team bypass

Cloud attacks haven’t yet become very sophisticated. In AWS, most of the external attacks are related to resource mis-configurations and/or stolen credentials. Many audit trail based detections in security products are easy to bypass unless they are comprehensive and complemented with resource details. GetCallerIdentity GetCallerIdentity is an AWS API call to…

Azure Sentinel

3 min read

SIEM/SOAR — Red team bypass
SIEM/SOAR — Red team bypass
Azure Sentinel

3 min read


Nov 30, 2022

Server-Side Encryption — Do you need it?

I run into Server-Side Encryption (SSE) every other day: compliance related alerts, AWS announcements about some service now supporting SSE. It all started with SSE support for S3 more than a decade ago. Let’s use S3 as an example to see what it provides. …

Cloud Security

5 min read

Server-Side Encryption — Do you need it?
Server-Side Encryption — Do you need it?
Cloud Security

5 min read


Published in

Better Programming

·Updated Mar 8

AWS CloudTrail — The Good, the Bad, and the Ugly

Glue your audit trails together easily — A good audit trail captures sufficient information about who, what, when, and where. If any of these are missing or lacking in details, it becomes a nightmare to glue things together. I spent a decent amount of time analyzing AWS CloudTrail (CT). Many Cloud Security Posture Management (CSPM) and Cloud…

Cspm

8 min read

AWS CloudTrail — The Good, the Bad, and the Ugly
AWS CloudTrail — The Good, the Bad, and the Ugly
Cspm

8 min read


Aug 8, 2022

CIEM — Managing Excess Permissions in Public Cloud

Cloud Security teams have heard of Cloud Infrastructure Entitlement Management (CIEM). It’s one of many buzzwords in Cloud Security. One common feature in every CIEM product is mitigating risks due to excess permissions. Excess permissions refer to the permissions an entity (user, resource, etc.) have been given but have not…

Cloud Security

4 min read

CIEM — Managing Excess Permissions in Public Cloud
CIEM — Managing Excess Permissions in Public Cloud
Cloud Security

4 min read


Jul 22, 2022

Cloud Security — Network Security (CSNS)

Virtual networking in the Cloud has become very complicated. Current crop of security tools focus heavily on only resource misconfigurations, compliance, vulnerabilities etc. But I haven’t seen much focus on network security concerns. Simple construct in the AWS networking is a security group (SG). Security Group It is a firewall around an…

AWS

3 min read

Cloud Security — Network Security (CSNS)
Cloud Security — Network Security (CSNS)
AWS

3 min read


Feb 3, 2015

AWS VPN High Availability

There are other approaches, that use two servers per VPC (OpenVPN or OpenSWAN/StrongSWAN etc) connecting to remote VPN servers. High availability (HA) is implemented using a script to monitor and swap routes in the route table. That might be cheaper to implement. You could also use Amazon’s Direct Connect etc…

9 min read

AWS VPN High Availability
AWS VPN High Availability

9 min read

Seshu Pasam

Seshu Pasam

46 Followers

CTO @ Ariksa

Following
  • Netflix Technology Blog

    Netflix Technology Blog

  • Michael Moore

    Michael Moore

  • Jon Hirschtick

    Jon Hirschtick

  • Chefmattrock

    Chefmattrock

  • Om Malik

    Om Malik

See all (28)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams