• Home
  • Services
  • Independent Assessment
  • Risk Management
  • About Us
  • Medium Stories
  WILDS INFORMATION SECURITY
  • Home
  • Services
  • Independent Assessment
  • Risk Management
  • About Us
  • Medium Stories

MEDIUM STORIES

Cloud Security / Governance

  1. What is Cloud Custodian?
  2. Propagating Tags from provider level down to all resources using Terraform Template
  3. Treating the Mishmash of Missing Tag Resources in AWS using the Cloud Custodian (Part 1)
  4. Tried replacing the Cloud Custodian with Something else…
  5. Cloud Custodian Policies for CIS AWS Foundations Benchmark (Part 1)
  6. ​Cloud Custodian Policies for CIS AWS Foundations Benchmark (Part-2)
  7. ​Cloud Custodian Policies for CIS AWS Foundations Benchmark (Part-3)
  8. Cloud Custodian Policies for CIS AWS Foundations Benchmark (Part-4)
  9. A Watchman for Your Cloud that never sleeps, and it’s free!
  10. Azure- Identify the resources with missing tags using the Cloud Custodian for Azure
  11. ​Establishing the Cloud Governance Committee
  12. Identify AWS Resources Exposed to the World using Cloud Custodian
  13. ​Identify Unencrypted AWS Resources using Cloud Custodian
  14. ​Azure- Count the Azure Resources using the Cloud Custodian
  15. Azure- Cloud Custodian Policies for Azure WebApp
  16. Azure- Cloud Custodian Policies for Azure SQL Database and SQL Server
  17. Auto-remediation for missing tags in AWS using Cloud Custodian — Part 1
  18. ​Auto-remediation for missing tags in AWS using Cloud Custodian — Part 2
  19. ​Auto-remediation for missing tags in AWS using Cloud Custodian — Part 3
  20. Relationship between the Cloud Custodian Lambda Function and the Cloudwatch Event Rule (Part 1)
  21. ​Cloud Custodian Policies for CIS Microsoft Azure Foundations Benchmark (Part 1)
  22. ​Cloud Custodian Policies for CIS Microsoft Azure Foundations Benchmark (Part 2)
  23. Azure- Cloud Custodian Policies for CIS Microsoft Azure Foundations Benchmark (Part 3)
  24. How to tag at resource and account level in AWS?
  25. Upgrade your Cloud Custodian to the latest version
  26. Cloud Custodian [GZ] Output Files
  27. Ingesting Cloud Custodian Logs into Sumo Logic (Part 1)
  28. Cloud Custodian Policy Health Checks
  29. AWS Resources Inventory using Cloud Custodian
  30. Upgrade your c7n-mailer and other components
  31. Azure- Cloud Custodian Policies for Azure Subscriptions
  32. Turn on and off your AWS resources using the Cloud Custodian
  33. Relationship between the Cloud Custodian Lambda Function and the Cloudwatch Event Rule (Part 2)
  34. Dashboard for Cloud Custodian
  35. ​Ingesting Cloud Custodian Logs into Sumo Logic (Part 2)
  36. Writing the Cloud Custodian Policy, Validate, Run, and Reporting
  37. Took help from ChatGPT to write Cloud Custodian Policies
  38. Reducing the Cost of your Cloud, before it drains your pocket.

Other Topics

  1. What is ISO 27001 and 27002?
  2. Understanding SOC 2 reporting dates
  3. Picking your GRC Tool — Part 1
  4. Picking your GRC Tool — Part 2
  5. Access Review — Compliance Requirement
  6. Understanding SOC 2 Structure
  7. Virtualization Overview
  8. Containers v/s Virtualizations
  9. The transition from ISO 27001:2013 version to ISO27001:2022 — Part 1
  10. Key diagram types used in information security
  11. The transition from ISO 27001:2013 version to ISO27001:2022 — Part 2
  12. ISO 27002 — Themes and Attributes + Control Layout
  13. Cyber Security Supply Chain Basics — Part 1
  14. Cyber Security Supply Chain Risk — Understanding Risks — Part 2
  15. Use Cloud Custodian to solve the missing tag problem for newly created resources
  16. Instant-On-Gap Security
  17. Understanding Vendor Lock-in and Vendor Lock-out in Public Cloud
  18. Information Security Program Metrics
  19. Software Bill of Materials(SBOM)-Part 1
Risk Assessment and Risk Treatment
Third Party Security Risk Management
FedRAMP Authorization
Information Security Management System
ITGC SOX 404 Internal Controls
Change Management
Threat Vulnerability Management
Asset Management
Human Resource Security
​Incident Response Plan Testing
​
​
ISMS Scope
ISO Statement of Applicability
PCI Responsibility Matrix
GRC Implementation
Policies and Procedures
CIS Controls Top18
Cloud Security
​Access Review
Business Continuity Summary
Disaster Recovery Summary
Security Whitepaper
Atlassian JIRA and Confluence

Company

About Us
​Medium Stories
Terms of Use
Non-Disclosure Agreement Template
Statement of Work Template
© COPYRIG​HT 2023. ALL RIGHTS RESERVED.
  • Home
  • Services
  • Independent Assessment
  • Risk Management
  • About Us
  • Medium Stories