AWS Security
Security Posture
In this link you will find a cloud security roadmap template
https://roadmap.cloudsecdocs.com/
In this link you will find an article on how to establish a cloud security program
https://www.marcolancini.it/2021/blog-cloud-security-roadmap/
An interesting resource which aims to provide a security maturity model tailored to AWS
https://maturitymodel.security.aws.dev/en/model/
List of AWS Guardrails for security guidelines for services
https://test.turbot.com/help/security
AWS security opensource tools
In this github repository you will find a bunch of opensource tools for Cloud security purposes
https://github.com/toniblyx/my-arsenal-of-aws-security-tools
In this github repository you will find a an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report.
https://github.com/salesforce/cloudsplaining
Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and customize security frameworks.
https://github.com/prowler-cloud/prowler
This blog provides you everyweek all new open source tool from aws.
This tool will scan for publicly accessible assets on your AWS environment.
AWS Security Podcast
Top 100 ranked Weekly LIVE Interviews with Cloud Security Leaders and Practitioners from around the globe.
https://cloudsecuritypodcast.tv/#start-here
AWS security digest that centralize all the best newsletter for aws
https://app.mailbrew.com/zoph/aws-security-digest-HrkhwqNrwBBk
Design AWS cloud architecture
Architecture framework to set up the Cloud Foundation, which every company should set up at some point in the transition to Cloud.
https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html
AWS Organizations
Best Practices for AWS Organizations Service Control Policies in a Multi-Account Environment
How to control access to AWS resources based on AWS account, OU, or organization
Serverless security
Security reference architecture for a serverless application
Learn how to implement security in the cloud at the application laye with Lambda
https://scalesec.com/blog/implementing-secure-code-in-the-cloud/
AWS IAM Least privilege
Speeding Up AWS IAM Least Privileges with Cloudsplaining, Elastic Stack, & AWS Access Analyzer
https://www.youtube.com/watch?v=LJfe1jMAeFk
Different scenari for IAM privilege escalation based on permission
https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
AWS KMS
Defining threat model and attack vector on AWS KMS service