Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

How to access AWS Console using AWS IAM

This blog post explores the traditional authentication and authorization processes to AWS Management Console, and how Teleport can replace them to further secure and audit your Infrastructure Access for AWS. You can access your AWS Management Console through a variety of methods. If a user has AWS Administrator or Root Access, they can see and edit all infrastructure in its entirety. AWS has multiple tools available to mitigate access, but are they enough?

Azure Account Integration, RBAC, and More in May CloudCasa Feature Update!

Spring has arrived, the flowers are blooming and, for us Kubernetes fans, CNCF’s KubeCon Europe conference has just begun in Valencia! Here at Catalogic, the CloudCasa team has spent the last few months trying to top our February release by developing another set of great new features.

Scaling Open Policy Agent: Styra DAS vs. DIY OPA

Enterprises are shifting rapidly to the cloud in order to increase scalability, improve efficiency and lower their costs. In the process, every company has become a software company — constantly building and updating new software — while the cloud has radically transformed how software is built. Oftentimes, the modern cloud-native application will be made up of several (or hundreds of) microservices, while being hosted on dynamic scaling platforms like Kubernetes.

The IaC Showdown: Terraform vs. Ansible

Infrastructure as code (IaC) has become the de-facto method for dealing with infrastructure at scale. This codification of infrastructure configurations lets software development teams create version-controlled, reusable configurations. Moreover, it enables integrating infrastructure management as a part of the delivery pipeline.

Our Vision for SBOMs is Dynamic

In previous posts we’ve expounded on the importance of using a dynamic rather than a static software bill of materials (SBOM), and how these SBOMs can translate into stronger cyber security. Now we want to share our vision of what a dynamic SBOM needs to be. Rezilion’s Dynamic Software Bill of Materials, now generally available for on-premises and cloud environments, is designed to help organizations actively manage security across the entire software development life cycle (SDLC).

NIMBUSPWN: What You Need to Know Now

By: Ofri Ouzan, Security Researcher, Rezilion The Microsoft 365 Defender Research Team has discovered several vulnerabilities in the `networkd-dispatcher` that are identified as CVE-2022-29799 and CVE-2022-29800 and dubbed as Nimbuspwn. The vulnerabilities were identified by listening to messages on the System Bus while performing code reviews and dynamic analysis on services that run as root.