k9 Security
  • Use Cases
    • DevOps
    • Enterprise Security
    • MDR & SOC
    • OEM Integrations
  • Demo
  • Pricing
  • Docs
  • Contact
  • About
  • Blog
  • Sign up
Select Page

k9 now analyzes access to AWS Resource Access Manager

by Stephen Kuenzli | Jan 27, 2023 | Announcements, Security

k9 Security now analyzes principals’ access to the AWS Resource Access Manager APIs. k9 reports whether IAM principals may administer or read Resource Access Manager sharing configurations. AWS Resource Access Manager helps you share AWS network and data...

Activate Multiple MFA Devices for Root User of AWS account *Walkthrough Video*

by Chase Christy | Nov 22, 2022 | Announcements, Security

Recently, AWS announced that you can assign multiple MFA devices to your IAM users, including the root user. Watch the video below for a step by step walkthrough of how to set up your second MFA device and what to do if your device is lost or broken. Resources:...

k9 now analyzes access to Amazon ECR

by Stephen Kuenzli | Nov 16, 2022 | Announcements, Security

k9 Security now analyzes principals’ access to the Amazon Elastic Container Registry (ECR) APIs. k9 reports whether IAM principals may administer, read, write, and delete ECR image registries and repositories. Amazon ECR is a fully managed Docker container...

k9 now analyzes access to AWS Systems Manager (SSM)

by Stephen Kuenzli | Oct 4, 2022 | Announcements

k9 Security now analyzes principals’ access to the AWS Systems Manager APIs (ssm). k9 reports whether IAM principals may administer, read, write, and delete Systems Manager resources. AWS Systems Manager gives you visibility and control over AWS and on-premises...

Analyze AWS IAM permissions on demand with the k9 CLI

by Stephen Kuenzli | Sep 29, 2022 | Announcements, Security

Now you can verify the effects of AWS IAM policy changes quickly by analyzing an AWS account’s IAM permissions on-demand with the k9 CLI’s analyze account command. This command helps Cloud teams and consultants tighten the security policy engineering loop....

Identify risks of excess AWS IAM permissions with the k9 CLI

by Stephen Kuenzli | Sep 7, 2022 | Announcements, Security

Now you can quickly identify risks to your data and encryption resources with the k9 CLI. Sifting through the access capabilities in an AWS account with many resources and principals can be daunting, especially because some analysis rules vary by AWS account. So now...
« Older Entries
Next Entries »

Recent Posts

  • Generate least-privilege EventBridge policies and restrict access to your AWS Organization with k9-cdk
  • Building Evals for an AI Agent: From Zero to Consistency Testing
  • How to Connect Strands Agents to AWS MCP with IAM Authentication
  • The top AWS Identity and Organization security launches of 2025
  • How to Systematically Convert Cloud Security Assessments into Client Outreach

Recent Comments

    Copyright 2025 K9 Security Inc.