kirkpatrickprice logo
  • Explore
    • AWS
    • Azure
    • GCP
    • Information Security Policy
    • Risk Assessment
  • Audit
    • Start a scan
    • Information security policy review
    • Risk assessment review
  • Learn
  • Contact
  • Pricing

Build AWS Expertise

Run our secure AWS scan to receive a report with custom recommendations from our cloud security experts.

Start Free ScanLearn More

Unlock Free AWS Resources

Sign up to download the 20 policies you need for AWS compliance and start your cloud security journey today.

Download Now
  • All
  • Configuration Management
  • Data Security
  • Logical Access
  • Network Monitoring
  • Penetration Testing
  • Vulnerability Management
Configuration Management

Configuration Management

Learn about configuration standards from industry leaders such as the Center for Internet Security, NIST, SANS, AWS, and Microsoft.

View all
AWS Controls for Implementing a DMZ
Best Practices for Container Security
Configuring Network Border Controls
House Accounts in CloudTrail
How to Restrict Public Access to S3 Buckets
How to Use S3 Bucket Policies
Industry Best Practices for Configuration Standards
Introduction to AWS Network Firewall
Introduction to AWS WAF and Shield
Introduction to Amazon EKS
Meeting Firewall and Router Configuration Standards
Network Segmentation for AWS
Preventing Publicly Available S3 Buckets
Reviewing Firewall and Router Configurations
Systems Manager Maintenance
Data Security

Data Security

Learn about practices to safeguard data using encryption, transport layer security, and effective key management during transmission, processing, and storage.

View all
Basic Tools for AWS Security
Cloud Attacks on the Rise
Do All Keys Have Resources Attached?
Encrypting Traffic In and Out of AWS
Encryption Decisions for Your Technology Stack
Encryption Opportunities
Encryption for EBS Volumes
Encryption for S3 Buckets
Enforcing Strong TLS Ciphers
Events that Drive Key Rotation
FAQs for Amazon S3 Security
How to Configure Encryption for EBS Volumes on Existing EC2 Instances
How to Configure Encryption for EBS Volumes on New EC2 Instances
How to Configure Encryption for RDS
How to Configure Encryption for S3 Buckets
Introduction to Amazon Inspector
Key Rotation and Management
Load Balancers Must Require TLS 1.2
Preventing Public Accessibility on DB Instances
Re-Keying for Decryption
Route 53 Support for DNSSEC
The AWS Shared Responsibility Model
Using AWS KMS
Using Prowler to Evaluate AWS Security
Using S3 Versioning
Using TLS 1.2 to Encrypt Data in Transit
Logical Access

Logical Access

Learn about identity and access management to protect assets against unauthorized use.

View all
AWS Functions to Restrict Database Access
AWS Password Best Practices
AWS Password Expiration Policies
AWS Password Reuse Policy
Access Control Using IAM Instance Roles
Assign Access Based on Business Need to Know
Attaching IAM Policies to Groups or Roles
Avoid Use of the Root Account
Basics of Role Assumption
Best Practices for Change Management in AWS
Best Practices for Password Parameters
Define Acceptable Use of Technology Part 1
Defining Resources in IAM Policies
Defining Resources in S3 Bucket Policies
Defining Roles and Responsibilities in AWS
Developing a Process for User Authentication
Disabling Unused Credentials
Documenting a Systems Inventory in AWS
Enabling MFA for All IAM Users
Enforce Separation with Access Controls
Enforcing Strong Encryption in AWS
How to Attach IAM Policies to Groups or Roles
How to Check MFA in a Credential Report
How to Check Use of the Root Account
How to Find Administrative Privileges in IAM Policies
How to House Multiple Accounts Within an AWS Organization
How to Modify Password Complexity in a Password Policy
How to Modify Permissions to EBS Snapshots
How to Prevent Password Reuse in a Password Policy
IAM Policies for Account Authentication
IAM Policies that Address Administrative Privileges
Identifying Unused Credentials in a Credential Report
Introduction to Amazon S3 Access Points
Introduction to IAM Access Analyzer
MFA for API Calls
Prevent Shared, Group, or Generic Accounts in AWS
Restricting Access to EBS Snapshots
Rotating Access Keys
Support MFA through IAM Policies
Understanding the "Deny All" Function
Using IAM Instance Roles for AWS Resource Access
Using IAM Policies
When to Use S3 Access Control Lists
Network Monitoring

Network Monitoring

Learn about the tools and techniques to monitor the performance and security of your environment.

View all
Attributes of Log Data
Audit Trail Review with Kibana, Athena, and GuardDuty
Audit Your Security Groups for Insecure Ports and Protocols
Change-Detection Solutions in AWS
Disabling Insecure Ports and Protocols
Ensure ALBs Have WAF ACLs Attached
Ensure RDS Instances are Only Accessible by Internal IPs
Ensuring Role Assumption is Logged
Filters and Alarms in CloudWatch
GuardDuty Alerts for Control Failures
How to Edit Inbound Traffic Rules for Default Security Groups
Identify Unrestricted Access to Ports for Security Groups
Identify if EC2 Instances Are Directly Connected to the Internet
Introduction to Amazon CloudWatch
Logging Tools in AWS
Logging Web ACL Data in Amazon Kinesis
Protecting API Gateways with WAF Rules
Restrict Security Group Access to All Ports
Retaining Your Audit Trail in AWS
Routing Outbound Traffic Through NAT Gateways
Securing Your Log Files
The Difference Between NACLs and Security Groups
Using Amazon Time Sync Service
Using a Bastion Host or Session Manager to Limit Access to Port 22
Penetration Testing

Penetration Testing

Learn how to evaluate the security of your systems and identify vulnerabilities through ethical hacking.

View all
Penetration Testing for AWS Segmentation Controls
Penetration Testing in AWS
Separation of Duties in Penetration Testing
Vulnerability Management

Vulnerability Management

Learn about protecting your critical assets with a comprehensive program to defend against malicious threats.

View all
Antivirus Solutions on EC2 Instances
Deploying Security Patches on EC2 Instances
Identifying and Ranking Vulnerabilities in AWS
Meeting Your Baseline with Patch Manager
Running Vulnerability Scans After a Significant Change
Shared Responsibility Matrix in PCI
Testing for Unauthorized Wireless Access Points
The Value of Quarterly Internal Vulnerability Scans
Top 10 AWS Mistakes
Using Systems Manager from a Service-Linked Role
Using VPC Endpoints to Access Systems Manager
Using an ASV for External Vulnerability Scans
kirkpatrickprice logo

Explore

AWS SecurityAzure SecurityGCP SecurityRisk AssessmentInformation Security PolicyWorkshops

Audit

Start a ScanSubmit your risk assessmentSubmit your information security policyChecks we performView your reportAWS connection instructionsAzure connection instructionsGCP connection instructions

Learn

IdentifyProtectDetectRespondRecover

Contact

Live — Online Experts

About

Visit kirkpatrickprice.comFollow Us on LinkedInTerms and ConditionsPrivacy PolicySecurity