AWS Security Fundamentals 2nd Ed Certificate For Tim Layton @ CloudSecurityLaunchPad.com

AWS Security Fundamentals Training

I recently took the AWS Security Fundamentals Training course and passed the exam. The AWS Security Fundamentals Training course is a great place to start if you are interested in earning your AWS Security Speciality Certification.

Amazon Inspector For Automating Security Assessments & Remediations In AWS by Tim Layton @ CloudSecurityLaunchPad.com

Amazon Inspector For Automating Security Assessments & Remediations In AWS

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It assesses applications for vulnerabilities or deviations from best practices developed by AWS. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity that can and should be reviewed by qualified information security professionals.

Understanding Auditing On The AWS Platform by Tim Layton @ CloudSecurityLaunchPad.com

Understanding Auditing On The AWS Platform

The AWS Management Console, along with the AWS CLI, can produce powerful results for auditors across multiple regulatory, standards, and industry authorities. I am going to cover some of the key sources that produce important and meaningful log information that you can use within your audit and compliance program.

IAM Security Checklist For AWS by Tim Layton

IAM Security Checklist For AWS

Identity and access management (IAM) is the new perimeter in our cloud-based world. IAM is a way to tell who a user is and what they are allowed to do, so it is critical that IAM is implemented correctly and securely.

Orchestration Threats For SD-WAN by Tim Layton

Orchestration Threats For SD-WAN

I recently wrote an article describing four main threats for SD-WAN that can be used as a checklist for cybersecurity professionals and enterprise stakeholders when reviewing and implementing SD-WAN. In this article today, I am going to dive deeper into Orchestration Layer Threats for SD-WAN and some key points for consideration.

SD-WAN Security Threat Checklist by Tim Layton

SD-WAN Security Threat Checklist

Software Defined Wide Area Networking (SD-WAN) is quickly becoming an enterprise staple to help control costs, reduce application latency, and reduce network downtime. However, with all of those benefits come with new cybersecurity threats and risks that should be considered and evaluated prior to deployment.