k9 Security Blog
Secure your cloud infrastructure quickly and confidently
Togo, the Siberian Husky famous for his efforts delivering diphtheria serum to Nome Alaska in 1925; photo from 1921 k9 Security has completed deployment of our v2 AWS access analyzer, "Husky", to all customer accounts! k9 Security has always strived to help customers...
Learn how S3 is changing the handling of the root identity in bucket policy on Oct 20, 2023. Determine which statements this change applies to, the effects of the change, and how to deal with it.
Analyze IAM access to Amazon Elastic File System (EFS) APIs and file systems with k9 Security. Review who can administer EFS resources and read, write, or delete data on EFS file systems.
Audit who can share AWS network and data resources across your accounts with Resource Access Manager using k9 Security.
Watch a step by step walkthrough of how to set up your second MFA device and what to do if your device is lost or broken.
k9 Security now analyzes principals’ access to the Amazon Elastic Container Registry (ECR) APIs.
k9 Security now analyzes principals’ access to the AWS Systems Manager APIs. k9 reports whether IAM principals may administer, read, write, and delete Systems Manager resources.
Now you can verify the effects of AWS IAM policy changes quickly by analyzing an AWS account’s IAM permissions on-demand using the k9 CLI.
Now you can quickly identify risks to your data and encryption resources from excess permissions with the k9 CLI.
k9 Security now analyzes principals’ access to the AWS Secrets Manager APIs. k9 reports whether IAM principals may administer, read, write, and delete secrets.
Get k9 News
Get k9 Security technical articles & release updates, at most weekly.