mirror of
https://github.com/jassics/awesome-aws-security.git
synced 2025-03-13 17:46:34 -04:00
Updated README with few more contents
This commit is contained in:
parent
f8451828e1
commit
12494b619c
@ -10,6 +10,7 @@ _List inspired by the [awesome](https://github.com/sindresorhus/awesome) list th
|
||||
3. Security Best Practices on AWS by PackT
|
||||
4. Cloud Security Automation
|
||||
5. AWS Automation Cookbook
|
||||
6. [AWS Lambda Security Best Practices](http://www.aliencoders.org/wp-content/uploads/2020/01/AWS-Lambda-Security-eBook-1.pdf) - It's published by Puresec and it has a good overview on AWS Lambda Security Best Practices which we should follow
|
||||
|
||||
## AWS Whitepapers
|
||||
AWS has awesome lists of whitepapers related to AWS Security. We are adding few important one here. You can anytime check more for updated or new security whitepapers [here](https://aws.amazon.com/security/security-learning/?whitepapers-main.sort-by=item.additionalFields.sortDate&whitepapers-main.sort-order=desc)
|
||||
@ -33,6 +34,7 @@ AWS has awesome lists of whitepapers related to AWS Security. We are adding few
|
||||
17. [AWS CAF Security perspective](https://d1.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf)
|
||||
18. [AWS Auditing Security Checklist](https://d1.awsstatic.com/whitepapers/compliance/AWS_Auditing_Security_Checklist.pdf)
|
||||
19. [Introduction to AWS Security Processes](https://d0.awsstatic.com/whitepapers/Security/Intro_Security_Practices.pdf)
|
||||
20. [AWS CIS Foundation benchmark](https://d1.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf)
|
||||
|
||||
## Videos
|
||||
1. [AWS Security by Design](https://www.youtube.com/watch?v=I1SwoKxB13c) - Youtube
|
||||
@ -51,7 +53,7 @@ AWS has awesome lists of whitepapers related to AWS Security. We are adding few
|
||||
7. [A deep dive into AWS S3 access control](https://labs.detectify.com/2017/07/13/a-deep-dive-into-aws-s3-access-controls-taking-full-control-over-your-assets/) - It will give a very good grip on how S3 buckets can be exploited. Lengthy but worth to go through.
|
||||
8. [How Federico hacked a whole EC2 network during a penetration test](https://www.secsignal.org/en/news/how-i-hacked-a-whole-ec2-network-during-a-penetration-test/)
|
||||
9. [A short blog on hacking AWS](https://www.devopsgroup.com/blog/hacking-aws-blog/) - Examples are based on cloudgoat.
|
||||
10. [S3 security is flawed by design](https://www.upguard.com/blog/s3-security-is-flawed-by-design) - This article will show you why you need to be extra careful when using AWS S3.
|
||||
10. [S3 security is flawed by design](https://www.upguard.com/blog/s3-security-is-flawed-by-design) - This article will show you why you need to be extra careful when using AWS S3.
|
||||
|
||||
## Online Courses (Paid/Free)
|
||||
1. [AWS Fundamentals: Address Security Risks](https://www.coursera.org/learn/aws-fundamentals-addressing-security-risk) - Coursera
|
||||
|
Loading…
x
Reference in New Issue
Block a user