After nine long years, ISO 27002:2013 has been updated to 27002:2022 (Information security, cybersecurity, and privacy protection — Information security controls).
Cloud computing deeply affects governance because the new cloud-based world is a fast-paced and emerging business model and technologies that require new types of controls and processes.
Before heading into 2022, I review the best cloud security certification to pursue.
I share the five security pillars that every AWS cloud deployment should consider and ultimately implement within each layer of your application/system deployment.
In this article today, I provide you with a checklist that you can use to make sure you have processes and programs in place for properly securing your workloads in the cloud.
Before we can build the new Web Phonebook Application, you need to have a free AWS account and you need some background information about how AWS IAM works and how it applies to our Web Phonebook Application.
In a brand new series of articles, I walk you through how to build a web-based phonebook application on AWS to help illustrate the basics of cloud computing.
You should look at each of your AWS workloads and run them through this basic security principles checklist to ensure you are not missing the obvious.
Visual Studio Code is an IDE tool that developers use to write code to build cloud environments (Infrastructure as Code).
Use this 17 item IAM best practices checklist as an internal audit for your AWS cloud computing environment.