k9 Security
  • Use Cases
    • DevOps
    • Enterprise Security
    • MDR & SOC
    • OEM Integrations
  • Demo
  • Pricing
  • Docs
  • Contact
  • About
  • Blog
Select Page
Top 5 Open-Source Cloud Security Tools You Need to Know in 2025

Top 5 Open-Source Cloud Security Tools You Need to Know in 2025

by Chase Christy | Apr 11, 2025 | Security

In this guide, we’re highlighting five of the most impactful open-source tools that help security and platform teams identify, monitor, and respond to vulnerabilities across the cloud lifecycle. Whether you’re scanning infrastructure as code before deployment,...

Generate least-privilege SQS resource policies with k9-cdk

by Chase Christy | Jan 25, 2025 | Announcements, Security

The k9-cdk now supports generating least-privilege resource policies for Amazon SQS queues with CDK v2. This addition complements the existing S3, KMS, and DynamoDB capabilities, bringing the same simplified approach for securing messaging infrastructure managed by...

Generate least-privilege DynamoDB resource policies with k9-cdk

by Stephen Kuenzli | Dec 24, 2024 | Announcements

The k9-cdk now supports generating least-privilege resource policies for Amazon DynamoDB tables, indices, and streams. This addition complements the existing S3 and KMS capabilities, bringing the same simplified approach for securing data to DynamoDB resources managed...

k9 now reports entitlements to Amazon Bedrock APIs

by Chase Christy | Dec 24, 2024 | Announcements, Security

k9 Security now reports IAM principals’ access entitlements to the Amazon Bedrock APIs. The Bedrock APIs allow customers to manage generative AI data resources and create AI-enabled services and agents. k9 reports whether IAM principals may administer, change,...

How to test a Python app uses an HTTP proxy to connect to AWS

by Stephen Kuenzli | Sep 12, 2024 | Security

Some organizations require that all outbound application traffic run through an HTTP proxy so that traffic can be inspected and limited to certain allowlisted domains. But how do you test your application to verify your client libraries have all been configured to use...
« Older Entries

Recent Posts

  • k9 Security Now Resolves Well-Known AWS Account Owners for Enhanced Visibility
  • Top 5 Open-Source Cloud Security Tools You Need to Know in 2025
  • Generate least-privilege SQS resource policies with k9-cdk
  • Generate least-privilege DynamoDB resource policies with k9-cdk
  • k9 now reports entitlements to Amazon Bedrock APIs

Recent Comments

    Copyright 2024 K9 Security Inc.