k9 Security Blog
Secure your cloud infrastructure quickly and confidently
k9 now summarizes Redshift access capabilities
Redshift analysis capabilities help you identify which IAM users and roles can administer Redshift clusters, use clusters, or read, write or delete Redshift cluster data in your AWS accounts.
Analysis for 3 more AWS services, roadmap, and HeckinIAM
For our final update of 2020, I'm happy to share additional AWS services analyzed by k9, a service support matrix & roadmap, and a little CloudSec comic relief. Service analysis additions k9 now supports analyzing three more services: CloudTrail...
k9 now summarizes CloudTrail access capabilities
k9 Security now summarizes principals’ access to the CloudTrail APIs and reports whether principals may administer, read, or delete trails.
k9 now summarizes access to SQS API actions
k9 Security now summarizes principals’ access to the SQS APIs and reports whether principals may administer queue resources or read, write, or delete messages.
k9 now summarizes access to STS API actions
k9 Security now summarizes principals' access to the STS APIs and reports whether principals may use resources, read data, or write data via the STS API. AWS Security Token Service (STS) is a service that enables you to request temporary, limited-privilege credentials...
Doing DevSecOps, AWS Marketplace, Better KMS & S3 policies – 2020-11
k9 helps Cloud teams improve security policies and accelerate delivery processes with usable automation and audit tools. We’re making these tools simple and economical to adopt so you don’t have to compromise on security engineering. In November, k9 released resources...
Mission Impossible: DevSecOps – Big Mountain Data & Dev 2020
Even with the best intentions and efforts, breaches happen and may seem impossible to prevent -- especially when you’re delivering 10 changes to production every month, week, or day. In the Mission Impossible: DevSecOps talk at Big Mountain Data & Dev on October...
Infrastructure Code Library Update – Terraform & AWS CDK
k9 Security believes usable and robust infrastructure code libraries are essential in making best practice accessible to application delivery, cloud, and security teams. If every team has to reinvent the automation wheel, you'll likely end up with an overbudget,...
k9 Security and Knowledge Base Enhancements – 2020q3
The k9 Security team spent the summer learning about Cloud practitioners' problems with AWS security and building solutions to those problems into k9. We'd like to share the most important enhancements with you, starting with k9 Security services: AWS Security Policy...
Why are good AWS security policies so difficult?
Creating good AWS security policies is difficult. The AWS security model is complex and difficult to understand, and application deployments are changing and growing rapidly.
Get k9 News
Get k9 Security technical articles & release updates, at most weekly.