k9 Security Blog
Secure your cloud infrastructure quickly and confidently
k9 Security Now Resolves Well-Known AWS Account Owners for Enhanced Visibility
k9 Security now resolves well-known AWS account owners like Datadog and AWS Support in external access reports. Enhanced visibility helps security teams quickly identify legitimate vendors vs. unknown entities, improving incident response and access governance.

Top 5 Open-Source Cloud Security Tools You Need to Know in 2025
In today’s rapidly evolving cloud landscape, security teams face the challenge of protecting increasingly complex environments without expanding their budgets. This guide highlights five powerful open-source cloud security tools that provide enterprise-grade protection without the price tag. From Prowler’s multi-cloud compliance auditing to Falco’s real-time threat detection, these solutions help security professionals identify vulnerabilities, enforce policies, and respond to incidents across AWS, Azure, and GCP environments. Whether you’re starting your cloud security journey or looking to enhance your existing toolset, these free, community-supported tools deliver immediate value while integrating seamlessly into modern DevSecOps workflows.
Generate least-privilege SQS resource policies with k9-cdk
k9-cdk now supports fine-grained access control for Amazon SQS queues in CDK v2. Learn how to secure your messaging infrastructure using our simplified security model for S3, KMS, DynamoDB, and SQS resources.
Generate least-privilege DynamoDB resource policies with k9-cdk
The k9-cdk now supports generating least-privilege resource policies for Amazon DynamoDB tables, indices, and streams. This addition complements existing S3 and KMS capabilities, bringing simplified security to DynamoDB resources managed by AWS CDK infrastructure code.
k9 now reports entitlements to Amazon Bedrock APIs
k9 Security now reports IAM principals’ access entitlements to the Amazon Bedrock APIs, which manages generative AI in your account. k9 reports whether IAM principals may administer, change, or read AI data resources and services so that you can govern access to AI services and reduce risks to your data and AI models.

k9 Security now simplifies IAM Security for Azure
k9 Security announces Azure IAM Access Analyzer now available for OEM integration
Streamlining IAM Access Governance for MSPs: The MontyCloud DAY2 and k9 Security Integration
MSPs face significant challenges in managing IAM across customers’ AWS accounts. The new integration between MontyCloud DAY2 and k9 Security offers a powerful solution for streamlining IAM access governance. This partnership provides comprehensive visibility and actionable insights for efficient IAM management. Learn how this integration can help MSPs enhance security offerings, ensure compliance for customer accounts, and drive revenue growth while managing cloud environments at scale.
How to test a Python app uses an HTTP proxy to connect to AWS
Learn how to configure a local HTTP proxy test environment using Docker, squid, the AWS CLI, and your application
The most usable cloud access spreadsheet
k9 designed its AWS IAM access spreadsheet reports to be the most usable and most informative tool for your initial access review and ad-hoc cloud access entitlement analyses. Right down to the column width.
k9 now analyzes access to AWS Account APIs
k9 Security analyzes principals’ access to the AWS Account APIs. Understand which IAM users and roles can manage important global account configurations, including what regions are enabled, contacts for the account, and even enable closing the account.
Get k9 News
Get k9 Security technical articles & release updates, at most weekly.