Categories
How To? Knowledge Sharing

CVE-2022–0185: What is it, how to identify, and it’s impact on Kubernetes Workloads

Researchers Jamie Hill-Daniel and William Liu discovered & disclosed a vulnerability in Linux Kernel.

It’s assigned a CVE ID of CVE-2022-0185. And is rated as High Severity. This got introduced to Linux Kernel as part of version 5.1-rc1 in March 2019, almost 3 years ago.

Categories
Knowledge Sharing What Is?

As A Cloud User, Should I Be Worried About Cloud Compliance?

Cloud audit is similar to any other audit, however, its main focus is on the nuances of cloud environments. The purpose of cloud computing audits is to determine whether cloud workloads are using best practices, complying with appropriate standards, and complying with certain benchmarks when offering services. The dynamic nature of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS) environments in the cloud increases the importance of auditing and compliance.

Categories
Knowledge Sharing

Complete List of AWS RDS Misconfigurations

Amazon RDS manages your cloud and data backup, software patching, automatic failure detection, and recovery, which protects you and your organization from misconfigurations. Amazon Relational Database Service (Amazon RDS) is a web service that allows you to focus on your application and gives them the fast performance, high availability, security, and compatibility they need. It […]

Categories
Guides Knowledge Sharing

A Complete List of AWS IAM Misconfigurations

IAM is a feature of AWS that is presented at no extra charge. However, having AWS IAM Misconfigurations is a constant headache for organizations. A single mistake can be worth millions. Implementing IAM can help you prevent catastrophic events like data breaches and insider attacks.

Categories
Knowledge Sharing

Implementing IAM in the Google Cloud Platform (GCP)

In this article, we will take a look at Identity Access Management or IAM in GCP (the Google Cloud Platform). Take a look and get a Brief understanding.

Categories
Knowledge Sharing What Is?

What is Multi-Factor Authentication (MFA)?

Most organizations require their employees to use multi-factor authentication (MFA) solutions these days. This is because your traditional passwords are not secure anymore. Think of this, between your sensitive data and a hacker, the first and only line of defense is your password. Over the years, hackers have become steadfast in developing better password cracking […]

Categories
Guides Knowledge Sharing

A Complete List of AWS S3 Misconfigurations

Amazon S3 or Amazon Simple Storage Service is an AWS service where data and objects are stored. It is the most popular public cloud service that offers data availability, security, and performance. Both small and large businesses use this service. Unfortunately, AWS S3 bucket misconfigurations are one of the most common causes of data breaches […]

Categories
Knowledge Sharing

Top 6 Azure Virtual Machine (VM) Misconfigurations To Avoid in 2021

This article will explore the top 6 most common Azure Virtual Machine (VM) misconfigurations you need to avoid in 2021.  What are Azure Virtual Machines? Azure offers many on-demand, scalable computing resources. Azure Virtual Machines (VM) is one of them. When you need more control over the computing environment, you choose Azure Virtual Machines. An […]

Categories
Knowledge Sharing

Tagging Strategies

Tagging strategies, you’ll get to know about tags and what are some best tagging strategies. We educate cause We know. Try professionals Try Cloudanix!

Categories
Guides Knowledge Sharing

Top 16 AWS S3 Misconfigurations To Avoid in 2022

Amazon S3 (Amazon Simple Storage Service) is an object storage service. It is the most popular public cloud service that offers data availability, security, and performance. It is used by both small and large businesses. To automatically monitor all your AWS resources for any security issues and potential exposure, AWS S3 is a great way […]