AWS58

Check out the latest posts

Shipping Tetragon Logs to AWS CloudWatch

Introduction So, you've deployed Tetragon and you're seeing the kernel-level security events it produces. You can see every process execution, every network connection, every file access. This is a goldmine of security data. But it immediately leads to the next big question: where do you put...

AWS Security Hub v2 Brings Attack Path Analysis to AWS

Introduction Finally - attack path analysis has arrived in AWS. 🎯 While GCP and Azure have long offered attack path analysis, AWS was suspiciously quiet. That silence is finally over. With Security Hub v2, AWS is finally bringing modern risk-based prioritization to its native ecosystem - not just listing misconfigurations, but...

Diagnosing EC2 Managed Instance Issues in AWS SSM

Introduction While building Lambda-based automation for patch management and security hardening, I frequently ran into a frustrating problem: some EC2 instances failed during software installation or SSM command execution. Usually the root cause was that the instance wasn’t a Managed Instance in SSM. An EC2 instance must be managed...

AWS Security Hub for Organizations

The Challenge of Security Visibility in the Past Back in the day, we followed best practices to configure our services securely. However, there was always the question: Did we actually configure everything correctly? Even if we used tools to identify misconfigurations, they rarely provided a comprehensive view across all services,...

You’ve successfully subscribed to Alexander Hose
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.