Sitemap
Cloud Security

Cybersecurity Attacks and Defenses in a Cloudy World

Turn Your AI Security Findings Into Repeatable Automated Checks

I took the security findings Q gave me and created deterministic tests that I added to run with my unit tests

3 min readSep 26, 2025

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Security Automation (Pre-AI). The Code.

⚙️ AI Automation. The Code.

🔒 Related Stories: Cybersecurity | Penetration Tests

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Forgive me I had to republish this story, so my subscribers may have gotten it twice due to a Medium glitch.

Pre-cursers to this post that explain how the code was derived

Learning Rust in one day — I used it to write a service that has logging, configuration, and periodically prints a configured message.

Then I tried to make the code more production-ready, including fixing security problems:

--

--

Cloud Security
Cloud Security

Published in Cloud Security

Cybersecurity Attacks and Defenses in a Cloudy World

Teri Radichel
Teri Radichel

Written by Teri Radichel

CEO 2nd Sight Lab | Pentesting | Research | AWS Security Hero | Masters of Infosec & Masters Software Engineering | GSE | IANS | SANS Difference Makers Award