The Hidden Port
From Cloud Security to Pentesting: My eJPTv2 Journey
What Is IDOR? Finding and Preventing Insecure Direct Object References in AWS APIs
Getting Started with Amazon GuardDuty: Setup, Findings, and SIEM Integration
Detecting Privilege Escalation in AWS Using CloudTrail and EventBridge
Building a Hardened Amazon Linux 2 AMI for Secure EC2 Deployments
Enforcing Least Privilege in AWS IAM with Access Analyzer and Last Access Data
Securing EC2 Access with AWS Systems Manager Session Manager: Eliminating SSH
Hardening EC2 Instances for AWS Security: A Practical Guide
I Built an AWS Incident Response Toolkit (and You Can Use It)
Monitoring AWS Security Events Without Breaking the Bank
Securing Temporary Credentials in AWS: Best Practices for Safe Role Usage
AWS Incident Response Playbook Template
Incident Response in AWS: A Playbook for Small Security Teams
How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam in 2025
Disclaimer
All Blog Posts
Building Least-Privilege IAM Roles with IAM Access Analyzer
How to Detect AWS Root Account Usage (And Respond to It)
AWS Security Checklist 2025: 10 Critical Steps to Secure Your Cloud
IAM Users Are Dead: Modern AWS Access Control for 2025
5 Critical AWS Security Misconfigurations (2025 Edition) – How to Find & Fix Them
About
Security Resources