RSS.Social

The Hidden Port

follow: @[email protected]

Posts

From Cloud Security to Pentesting: My eJPTv2 Journey

What Is IDOR? Finding and Preventing Insecure Direct Object References in AWS APIs

Getting Started with Amazon GuardDuty: Setup, Findings, and SIEM Integration

Detecting Privilege Escalation in AWS Using CloudTrail and EventBridge

Building a Hardened Amazon Linux 2 AMI for Secure EC2 Deployments

Enforcing Least Privilege in AWS IAM with Access Analyzer and Last Access Data

Securing EC2 Access with AWS Systems Manager Session Manager: Eliminating SSH

Hardening EC2 Instances for AWS Security: A Practical Guide

I Built an AWS Incident Response Toolkit (and You Can Use It)

Monitoring AWS Security Events Without Breaking the Bank

Securing Temporary Credentials in AWS: Best Practices for Safe Role Usage

AWS Incident Response Playbook Template

Incident Response in AWS: A Playbook for Small Security Teams

How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam in 2025

Disclaimer

All Blog Posts

Building Least-Privilege IAM Roles with IAM Access Analyzer

How to Detect AWS Root Account Usage (And Respond to It)

AWS Security Checklist 2025: 10 Critical Steps to Secure Your Cloud

IAM Users Are Dead: Modern AWS Access Control for 2025

5 Critical AWS Security Misconfigurations (2025 Edition) – How to Find & Fix Them

About

Security Resources