k9 Security
  • Use Cases
    • DevOps
    • Enterprise Security
    • MDR & SOC
    • OEM Integrations
  • Demo
  • Pricing
  • Docs
  • Contact
  • About
  • Blog
Select Page

k9 now reports entitlements to Amazon Bedrock APIs

by Chase Christy | Dec 24, 2024 | Announcements, Security

k9 Security now reports IAM principals’ access entitlements to the Amazon Bedrock APIs. The Bedrock APIs allow customers to manage generative AI data resources and create AI-enabled services and agents. k9 reports whether IAM principals may administer, change,...

How to test a Python app uses an HTTP proxy to connect to AWS

by Stephen Kuenzli | Sep 12, 2024 | Security

Some organizations require that all outbound application traffic run through an HTTP proxy so that traffic can be inspected and limited to certain allowlisted domains. But how do you test your application to verify your client libraries have all been configured to use...

The most usable cloud access spreadsheet

by Stephen Kuenzli | Feb 21, 2024 | Announcements, Security

Spreadsheets take a lot of flack but they’re often the right tool for the job. When the job is starting to clean up that ‘dirty kitchen sink’ AWS account or ad-hoc IAM permission analysis, a spreadsheet is often the right tool. Now that analysis is...

k9 now analyzes access to AWS Account APIs

by Stephen Kuenzli | Feb 17, 2024 | Announcements, Security

k9 Security now analyzes principals’ access to the AWS Account APIs. The Account (account) APIs manage important global configurations, including what regions are enabled, contacts for the account, and even enable closing the account. k9 reports whether IAM...

How S3 is changing the handling of the root identity in Bucket Policy on October 20, 2023

by Stephen Kuenzli | Oct 13, 2023 | Security

Amazon S3 is changing the handling of the root identity in bucket policy on October 20, 2023. AWS is known for security and backwards compatibility, so what’s the deal? AWS announced this change via email in February with follow-up to affected accounts in...
« Older Entries

Recent Posts

  • k9 Security Now Resolves Well-Known AWS Account Owners for Enhanced Visibility
  • Top 5 Open-Source Cloud Security Tools You Need to Know in 2025
  • Generate least-privilege SQS resource policies with k9-cdk
  • Generate least-privilege DynamoDB resource policies with k9-cdk
  • k9 now reports entitlements to Amazon Bedrock APIs

Recent Comments

    Copyright 2024 K9 Security Inc.