Cloud Security
Published in

Cloud Security

Automating Cybersecurity Metrics (ACM)

A series of blog posts on cybersecurity metrics and security automation

GitHub Repo (In Progress):

Walk through the thought process of creating secure Batch Jobs to capture and report on cybersecurity metrics in this blog series.

ACM.x Preventing Injection Attacks (XSS, etc.) in AWS Lambda

ACM.x SSM Parameter Store Security

ACM.x Automated Creation of Public and Private Networking

ACM.x Role Assumption in a Container

ACM.x Secure Messaging

ACM.x Separating Authentication from Applications

ACM.x Data Security for Batch Jobs

ACM.x Batch job POC

ACM.x Assuming a Role in a Batch Job (With MFA hopefully)

To be continued…

Teri Radichel

If you liked this story please clap and follow:

Medium: Teri Radichel or Email List: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests services via LinkedIn: Teri Radichel or IANS Research

© 2nd Sight Lab 2022

All the posts in this series:



Cybersecurity for Executives in the Age of Cloud on Amazon

Need Cloud Security Training? 2nd Sight Lab Cloud Security Training

Is your cloud secure? Hire 2nd Sight Lab for a penetration test or security assessment.

Have a Cybersecurity or Cloud Security Question? Ask Teri Radichel by scheduling a call with IANS Research.

Cybersecurity & Cloud Security Resources by Teri Radichel: Cybersecurity and Cloud security classes, articles, white papers, presentations, and podcasts



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Teri Radichel

Teri Radichel

Cloud Security Training and Penetration Testing | GSE, GSEC, GCIH, GCIA, GCPM, GCCC, GREM, GPEN, GXPN | AWS Hero | Infragard | IANS Faculty |