Home

Awesome

Awesome Cloud Security Awesome

Cloud Security blogs, podcasts, standards, projects, and examples.

Contents

Public Cloud Governance

AWS Governance

URL Services

ServiceURL
s3https://{user_provided}.s3.amazonaws.com
cloudfronthttps://{random_id}.cloudfront.net
ec2ec2-{ip-seperated}.compute-1.amazonaws.com
eshttps://{user_provided}-{random_id}.{region}.es.amazonaws.com
elbhttp://{user_provided}-{random_id}.{region}.elb.amazonaws.com:80/443
elbv2https://{user_provided}-{random_id}.{region}.elb.amazonaws.com
rdsmysql://{user_provided}.{random_id}.{region}.rds.amazonaws.com:3306
rdspostgres://{user_provided}.{random_id}.{region}.rds.amazonaws.com:5432
route 53{user_provided}
execute-apihttps://{random_id}.execute-api.{region}.amazonaws.com/{user_provided}
cloudsearchhttps://doc-{user_provided}-{random_id}.{region}.cloudsearch.amazonaws.com
transfersftp://s-{random_id}.server.transfer.{region}.amazonaws.com
iotmqtt://{random_id}.iot.{region}.amazonaws.com:8883
iothttps://{random_id}.iot.{region}.amazonaws.com:8443
iothttps://{random_id}.iot.{region}.amazonaws.com:443
mqhttps://b-{random_id}-{1,2}.mq.{region}.amazonaws.com:8162
mqssl://b-{random_id}-{1,2}.mq.{region}.amazonaws.com:61617
kafkab-{1,2,3,4}.{user_provided}.{random_id}.c{1,2}.kafka.{region}.amazonaws.com
kafka{user_provided}.{random_id}.c{1,2}.kafka.useast-1.amazonaws.com
cloud9https://{random_id}.vfs.cloud9.{region}.amazonaws.com
mediastorehttps://{random_id}.data.mediastore.{region}.amazonaws.com
kinesisvideohttps://{random_id}.kinesisvideo.{region}.amazonaws.com
mediaconverthttps://{random_id}.mediaconvert.{region}.amazonaws.com
mediapackagehttps://{random_id}.mediapackage.{region}.amazonaws.com/in/v1/{random_id}/channel

MultiCloud Governance

Kubernetes Operators

Container Tools

Cloud Security Standards

Learning

Blogs

Courses

Labs

Podcasts

Vulnerable By Design

Certifications

Projects

Alerting

Automated Security Assessment

Benchmarking

Data Loss Prevention

Firewall Management

Identity and Access Management

Incident Response

Spring

Threat modeling

Examples

Ex. Automated Security Assessment

Ex. Identity and Access Management

Ex. Logging

Ex. Web Application Firewall

Misc

Contribute

Contributions welcome! Read the contribution guidelines first.

License

CC0

To the extent possible under law, Jacob Silva has waived all copyright and related or neighboring rights to this work.