by Chase Christy | Apr 11, 2025 | Security
In this guide, we’re highlighting five of the most impactful open-source tools that help security and platform teams identify, monitor, and respond to vulnerabilities across the cloud lifecycle. Whether you’re scanning infrastructure as code before deployment,...
by Chase Christy | Jan 25, 2025 | Announcements, Security
The k9-cdk now supports generating least-privilege resource policies for Amazon SQS queues with CDK v2. This addition complements the existing S3, KMS, and DynamoDB capabilities, bringing the same simplified approach for securing messaging infrastructure managed by...
by Stephen Kuenzli | Dec 24, 2024 | Announcements
The k9-cdk now supports generating least-privilege resource policies for Amazon DynamoDB tables, indices, and streams. This addition complements the existing S3 and KMS capabilities, bringing the same simplified approach for securing data to DynamoDB resources managed...
by Chase Christy | Dec 24, 2024 | Announcements, Security
k9 Security now reports IAM principals’ access entitlements to the Amazon Bedrock APIs. The Bedrock APIs allow customers to manage generative AI data resources and create AI-enabled services and agents. k9 reports whether IAM principals may administer, change,...
by Stephen Kuenzli | Sep 12, 2024 | Security
Some organizations require that all outbound application traffic run through an HTTP proxy so that traffic can be inspected and limited to certain allowlisted domains. But how do you test your application to verify your client libraries have all been configured to use...
Recent Comments