k9 Security
  • Use Cases
    • DevOps
    • Enterprise Security
    • MDR & SOC
    • OEM Integrations
  • Demo
  • Pricing
  • Docs
  • Contact
  • About
  • Blog
  • Sign up
Select Page

AWS IAM Users vs. Identity Center & JIT: Is Your Cloud Access Strategy Secure or Stalling?

by Chase Christy | Aug 15, 2025 | Guest blogs

This article was originally written by Cloudanix Introduction The way we manage access in AWS has changed IAM dramatically. When many organizations first ventured into the cloud, creating individual AWS IAM users directly within each account was standard practice....

Effective IAM News – 2025-05-16

by Chase Christy | Aug 1, 2025 | The Effective IAM Newsletter

NCC Group’s AI Red Team recently published key findings after penetration testing dozens of AI applications. Analyzing Secure AI Architectures reveals that major AI vulnerabilities stem not from model flaws, but from misunderstanding how AI systems interact with...

Effective IAM News – 2025-03-21

by Chase Christy | Jul 19, 2025 | The Effective IAM Newsletter

Welcome to The Effective IAM Newsletter! Our mission is simple: curate high-impact resources that address real-world cloud IAM challenges for busy security professionals. Each edition features an industry trend, expert insight, or practical tool that you can use. You...

How to test a Python app uses an HTTP proxy to connect to AWS

by Stephen Kuenzli | Sep 12, 2024 | Security

Some organizations require that all outbound application traffic run through an HTTP proxy so that traffic can be inspected and limited to certain allowlisted domains. But how do you test your application to verify your client libraries have all been configured to use...

The most usable cloud access spreadsheet

by Stephen Kuenzli | Feb 21, 2024 | Announcements, Security

Spreadsheets take a lot of flack but they’re often the right tool for the job. When the job is starting to clean up that ‘dirty kitchen sink’ AWS account or ad-hoc IAM permission analysis, a spreadsheet is often the right tool. Now that analysis is...
« Older Entries

Recent Posts

  • Building Evals for an AI Agent: From Zero to Consistency Testing
  • How to Connect Strands Agents to AWS MCP with IAM Authentication
  • The top AWS Identity and Organization security launches of 2025
  • How to Systematically Convert Cloud Security Assessments into Client Outreach
  • Export Findings from Security Hub in OCSF Format: A Complete Guide

Recent Comments

    Copyright 2025 K9 Security Inc.