AWS security essentials for managing compliance, data protection, and threat detection

AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS Security Hub and Amazon GuardDuty to Amazon Macie and AWS Config, each tool is vi… Continue reading AWS security essentials for managing compliance, data protection, and threat detection

Whispr: Open-source multi-vault secret injection tool

Whispr is an open-source CLI tool designed to securely inject secrets from secret vaults, such as AWS Secrets Manager and Azure Key Vault, directly into your application’s environment. This enhances secure local software development by seamlessly manag… Continue reading Whispr: Open-source multi-vault secret injection tool

Russian Cozy Bear Hackers Phish Critical Sectors with Microsoft, AWS Lures

Russian state-sponsored hackers Cozy Bear are targeting over 100 organizations globally with a new phishing campaign. This sophisticated… Continue reading Russian Cozy Bear Hackers Phish Critical Sectors with Microsoft, AWS Lures

The Cloud Latency Map measures latency across 100+ cloud regions

Kentik launched The Cloud Latency Map, a free public tool allowing anyone to explore the latencies measured between over 100 cloud regions worldwide. Users can identify recent changes in latencies globally between various public clouds and data center … Continue reading The Cloud Latency Map measures latency across 100+ cloud regions

How are cross-account requests to assume IAM Roles using the ‘sts:AssumeRoleWithWebIdentity’ action authenticated?

I’m wondering how exactly IAM Roles for Service Accounts authenticate requests to assume a role using the sts:AssumeRoleWithWebIdentity action when the role is in another account? The documentation has enabled me to get my solution working… Continue reading How are cross-account requests to assume IAM Roles using the ‘sts:AssumeRoleWithWebIdentity’ action authenticated?