Featured
Automating Cybersecurity
A series of blog posts on cybersecurity automation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
⚙️A series on Security Automation. The Code.
💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Summary of this blog series:
GitHub Repo
AWS Security Automation Topics:
Approaching 350 posts exist in this series on automating Security Metrics Automation. I happen to be using AWS but the security and automation concepts are applicable to Azure, GCP or on premises environments. What started out as a simple blog series on batch job automation for security became a bit more complex. I also have close to 1500 posts on mostly cloud security at the time of this writing so organizing them by topic here to make them easier to find.
Creating and DEPLOYING a Static Website Hosted on AWS S3 (In progress)
Related:
Troubleshooting CloudFormation — tips and error messages you might face
Troubleshooting and Issues with EC2, CloudShell, etc.
Continuous improvement — revisions and do overs
I’m adding a preliminary post to this series to explain what it’s all about and where you may want to start. I decided to start over with a new account and rebuild everything out for reasons I explained along the way. All the initial posts are relevant and will be used in the new architecture. To decide where you want to start check out this post:
Walk through the thought process of creating secure Batch Jobs to capture and report on cybersecurity metrics in this blog series. Please note that this series contains information related to governance and secure deployments — not just the batch jobs themselves. I’m basically coding every day and writing about it as I go to complete a project I’m working on to help customers with security metrics.
Resource, IAM, and Trust Policies on AWS
ACM.24 Architecting defense in depth AWS policies.
medium.com
Creating Shared Repositories and Code in an Organization
ACM.46 DRY. Don’t Repeat Yourself.
medium.com
AWS Nitro Enclaves and TPMs
ACM.80 Protecting data and encryption keys in memory and in use
medium.com
Creating an AWS Governance Account
ACM.139 Creating OUs and Accounts in an AWS Organization
medium.com
Enabling Cost and Usage
ACM.204 Monitoring for security issues by watching account spending
medium.com
Had to republish this one:
Oops 364.
A vulnerability was announced that involves SSH and RSA. I addressed that vulnerability in these three posts.
Had to take a break here to work on some security changes due to an issue on one of my laptops. Looking for ways to improve security. Once I figure out the best way to deploy the additional security, I hope to deploy it with the container solution I’ve been working on. 😊
~~~
~~
To be continued…
Follow for updates.
Teri Radichel | © 2nd Sight Lab 2022
About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
⭐️ Author: Cybersecurity Books
⭐️ Presentations: Presentations by Teri Radichel
⭐️ Recognition: SANS Award, AWS Security Hero, IANS Faculty
⭐️ Certifications: SANS ~ GSE 240
⭐️ Education: BA Business, Master of Software Engineering, Master of Infosec
⭐️ Company: Penetration Tests, Assessments, Phone Consulting ~ 2nd Sight Lab
Need Help With Cybersecurity, Cloud, or Application Security?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Request a penetration test or security assessment
🔒 Schedule a consulting call
Follow for more stories like this:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
❤️ Sign Up my Medium Email List
❤️ Twitter: @teriradichel
❤️ LinkedIn: https://www.linkedin.com/in/teriradichel
❤️ Mastodon: @teriradichel@infosec.exchange
❤️ Facebook: 2nd Sight Lab
❤️ YouTube: @2ndsightlab