mirror of
https://github.com/Funkmyster/awesome-cloud-security.git
synced 2024-12-24 07:09:39 -05:00
Curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
awesomeawesome-listawsaws-securityccmcloudcloud-securitydata-loss-preventiondlpelasticsearchinformation-securityiso27001iso-27017iso27017loggingnistnist800-53securitysecurity-standardswaf
.gitattributes | ||
code-of-conduct.md | ||
contributing.md | ||
README.md |
Awesome Cloud Security
Cloud Security blogs, podcasts, standards, projects, and examples.
Contents
- Public Cloud Governance
- Containers
- Cloud Security Standards
- Learning
- Certifications
- Projects
- Examples
- Misc
- Contribute
- License
Public Cloud Governance
AWS Governance
- AWS CloudFormation Guard
- AWS CodePipeline Governance
- AWS Config Rules Development Kit
- AWS Control Tower Customizations
- AWS Security Hub Automated Response and Remediation
- AWS Vault
- AWS Well Architected Labs
MultiCloud Governance
Kubernetes Operators
- Aqua
- Misc
Container Tools
- Anchore
- Aqua
- Misc
Cloud Security Standards
Learning
Blogs
Courses
- Oracle
- A Cloud Guru
- Learning Paths
Labs
- AWS Workshops
- AWS Identity: Using Amazon Cognito for serverless consumer apps
- AWS Network Firewall Workshop
- AWS Networking Workshop
- Access Delegation
- Amazon VPC Endpoint Workshop
- Build a Vulnerability Management Program Using AWS for AWS
- Data Discovery and Classification with Amazon Macie
- Data Protection
- DevSecOps - Integrating security into your pipeline
- Disaster Recovery on AWS
- Finding and addressing Network Misconfigurations on AWS
- Firewall Manager Service - WAF Policy
- Getting Hands on with Amazon GuardDuty
- Hands on Network Firewall Workshop
- Implementing DDoS Resiliency
- Infrastructure Identity on AWS
- Integrating security into your container pipeline
- Integration, Prioritization, and Response with AWS Security Hub
- Introduction to WAF
- Permission boundaries: how to delegate permissions on AWS
- Protecting workloads on AWS from the instance to the edge
- Scaling threat detection and response on AWS
- Serverless Identity
- PagerDuty Training Lab
Podcasts
Vulnerable By Design
Certifications
- Cloud Vendors
- ISC2 - International Information System Security Certification Consortium
- CSA - Cloud Security Alliance
Projects
Alerting
Automated Security Assessment
Benchmarking
Data Loss Prevention
Firewall Management
- globaldatanet
Identity and Access Management
- AWS Labs
- Duo Labs
- Netflix
- Salesforce
- Misc
Incident Response
- AWS
- Netflix
- PagerDuty
- PagerDuty Automated Remediation Docs
- PagerDuty Business Response Docs
- PagerDuty DevSecOps Docs
- PagerDuty Full Case Ownership Docs
- PagerDuty Full Service Ownership Docs
- PagerDuty Going OnCall Docs
- PagerDuty Incident Response Docs
- PagerDuty Operational Review Docs
- PagerDuty PostMortem Docs
- PagerDuty Retrospectives Docs
- PagerDuty Stakeholder Communication Docs
- Velocidex
Spring
Threat modeling
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3 and how to mitigate them, following a risk-based approach
Examples
Ex. Automated Security Assessment
- AWS Config Rules Repository
- AWS Inspector Agent Autodeploy
- AWS Inspector Auto Remediation
- AWS Inspector Lambda Finding Processor
Ex. Identity and Access Management
Ex. Logging
- AWS Centralized Logging
- AWS Config Snapshots to ElasticSearch
- AWS CloudWatch Events Monitor Security Groups
Ex. Web Application Firewall
Misc
- Other Awesome Lists
Contribute
Contributions welcome! Read the contribution guidelines first.
License
To the extent possible under law, Jacob Silva has waived all copyright and related or neighboring rights to this work.