#cloud-security
Read more stories on Hashnode
Articles with this tag
Introduction Amazon Inspector, an automated security assessment service by AWS, empowers cloud security engineers to enhance application security by...
Introduction AWS IAM services provide cloud security engineers with the means to implement access control for their resources. To confirm user...
In this final challenge, we are provided with a user access key that has the Security Audit policy attached to it. We are tasked with exploring the...
Welcome to Level 5. For this level, we are given access to an EC2 instance hosting a simple HTTP proxy. The proxy allows us to access external...
Welcome to Level 4. We have been assigned the task of accessing the web page running on an EC2 at 4d0cf09b9b2d761a7d87be99d17507bce8b86f3b.flaws.cloud...
Welcome to Level -3. At this level, we are tasked with finding secret content in one of the S3 bucket files (“.git file"). The next level is at Level...