k9 Security Blog
Secure your cloud infrastructure quickly and confidently
First Look: Compare changes in AWS IAM access with k9
Today we'll share a first look at how you can compare changes in AWS IAM access with k9 Security. Cloud teams tell us they need an easy way to understand how IAM access changes over time so they can review access periodically. Additionally, IAM access change analysis...
AWS Access Analyzer Policy Generator, building block for continuous policy improvement
AWS Access Analyzer Policy Generator analyzes an IAM user or role's CloudTrail history and creates a least privilege IAM policy with only the actions that are in use (announcement). This policy generator looks like a great building block for minimizing AWS privileges...
AWS Access Analyzer Policy Checks Explained
AWS launched Access Analyzer Policy Checks to help you develop valid, secure policies and review existing policies. This post explains what the four types of policy checks do and how to start using them. The checks are available via console, CLI, and API...
Audit AWS IAM user credentials quickly and reliably
Audit AWS IAM user credentials used in your environment with k9 Security. Reviewing these credentials use is an essential security and audit activity.
k9 now summarizes EKS access capabilities
k9 Security now summarizes principals’ access to the Elastic Kubernetes Service (EKS) APIs. k9 reports whether IAM principals may administer or read EKS cluster and nodegroup configurations managed by AWS.
k9 now summarizes EC2 access capabilities
k9 Security now summarizes principals’ access to the Elastic Compute Cloud (EC2) APIs. k9 reports whether IAM principals may administer EC2 compute, network, and storage configurations and use or destroy those resources.
k9 now summarizes ECS access capabilities
k9 Security now summarizes principals’ access to the Elastic Container Service (ECS) APIs and k9 reports whether IAM principals may administer ECS cluster, service, and task configurations or use ECS to run tasks.
k9 now summarizes Lambda access capabilities
k9 Security now summarizes principals’ access to the Lambda APIs and reports whether IAM principals may administer Lambda function configurations or use your deployed Lambda functions.
k9 now summarizes Athena access capabilities
k9 Security now summarizes principals’ access to the Athena APIs. k9 reports whether IAM principals may administer Athena data catalog configurations and read or write data through Athena.
k9 now summarizes Redshift access capabilities
Redshift analysis capabilities help you identify which IAM users and roles can administer Redshift clusters, use clusters, or read, write or delete Redshift cluster data in your AWS accounts.
Get k9 News
Get k9 Security technical articles & release updates, at most weekly.