k9 Security Blog
Secure your cloud infrastructure quickly and confidently
k9 Security can now notify you when IAM administrators change in your AWS accounts. Understanding and tracking who has IAM administrator access is hard. IAM is extremely flexible and customers change their AWS deployments constantly. k9 Security makes it easier to...
Learn why AWS IAM is hard by studying the lessons from private interviews and a misconfiguration that resulted in an $80M data breach fine.
Analyze access to AWS IAM roles with k9 Security. AWS customers grant access to IAM roles for many reasons, but it’s easy to misconfigure.
Today we'll share a first look at how you can compare changes in AWS IAM access with k9 Security. Cloud teams tell us they need an easy way to understand how IAM access changes over time so they can review access periodically. Additionally, IAM access change analysis...
AWS Access Analyzer Policy Generator analyzes an IAM user or role's CloudTrail history and creates a least privilege IAM policy with only the actions that are in use (announcement). This policy generator looks like a great building block for minimizing AWS privileges...
AWS launched Access Analyzer Policy Checks to help you develop valid, secure policies and review existing policies. This post explains what the four types of policy checks do and how to start using them. The checks are available via console, CLI, and API...
Audit AWS IAM user credentials used in your environment with k9 Security. Reviewing these credentials use is an essential security and audit activity.
k9 Security now summarizes principals’ access to the Elastic Kubernetes Service (EKS) APIs. k9 reports whether IAM principals may administer or read EKS cluster and nodegroup configurations managed by AWS.
k9 Security now summarizes principals’ access to the Elastic Compute Cloud (EC2) APIs. k9 reports whether IAM principals may administer EC2 compute, network, and storage configurations and use or destroy those resources.
k9 Security now summarizes principals’ access to the Elastic Container Service (ECS) APIs and k9 reports whether IAM principals may administer ECS cluster, service, and task configurations or use ECS to run tasks.
Get k9 News
Get k9 Security technical articles & release updates, at most weekly.