Bookmarks
Security
- OWASP Cheatsheets
- How Not to Use Symmetric Encryption
- How to Secure Anything
- macOS Security and Privacy Guide
- Starting Up Security
- OSCP Guide
- Privilege Escalation
- A Guide to Linux Privilege Escalation
- Blockchain Graveyard
- SSH ProxyCommand
- Supply Chain
- TLDRSec
YubiKey
AWS
- AWS IAM Reference
- IAM Policy Ninja 2017
- IAM Policy Ninja 2015
- Securing AWS Temporary Tokens
- Coinbase Infrastructure
- IAM Basic Best Practices
- AWS Landing Zone
- AWS Landing Zone Terraform
- AWS Account Activity
- AWS Organizations Best Practices
- Security Best Practices the Well-Architected Way
- Best Practices for Managing Security Operations on AWS
- Mastering Identity at Every Layer of the Cake
- Best Practices for Managing, Retrieving, and Rotating Secrets at Scale
AWS Tooling
- Policy Sentry
- Cloudsplaining
- IAM Linting
- Cloudtracker - IAM Least Privilege
- Repokid - IAM Least Privilege