INE Training Notes - by syselement
Ask or search...
Ctrl
K
Home Blog
GitHub
Buy Me a Book
More
Home Blog
GitHub
Buy Me a Book
Courses
ICCA
Icca References
Previous
📒3. Cloud Identity, Security, and Compliance
Next
eMAPT
Last updated
1 year ago
Was this helpful?
Cloud Foundations
Management
Services
Cloud Management
Monitoring
Identity
Security
Attacks & Defense
Resource Protection
Compliance
🌐
Cloud Native Wiki - aquasec.com
Cloud Computing Architecture
The Cloud Management Plane
SaaS vs PaaS vs IaaS: What’s The Difference & How To Choose
Infrastructure as a Service (IaaS) vs Platform as a Service (PaaS)
Cloud Market Share
IDC - Worldwide Public Cloud Services Revenue and Year-over-Year Growth 2021
Amazon Web Services (AWS)
Microsoft Azure
Google Cloud Platform (GCP)
CapEx vs OpEx in Cloud Computing
AWS CLI
Azure Command Line tools
Google Cloud SDK
What is a REST API?
Google Cloud APIs
Postman tool
Azure Pricing Calculator
AWS Pricing Calculator
Google Cloud Pricing Calculator
AWS - Service Level Agreements (SLAs)
Azure - Service Level Agreements (SLA) for Online Services
Google Cloud Platform - Service Level Agreements
A Comparison of AWS vs Azure vs Google - VMware Blogs
Serverless Computing on AWS, Azure, and Google Cloud
Top 14 SaaS Application Examples - Successful Strategies
Shared Responsibility Model - Crowdstrike
AWS Share Responsibility Model
Azure Shared responsibility in the cloud
NIST Cloud Computing Standards Roadmap
Cloud Workload Security - Cyberark
Resource Management Models in Cloud Computing - geeksforgeeks.org
Google Cloud Monitoring
AWS CloudWatch
Azure Monitor
Google Identity and Access Management
Google Cloud IAM
Azure Identity
Azure AD
AWS IAM
AWS IAM Identities
What is defense in depth? | Layered security - Cloudflare
Infographic: Defense-in-Depth - colohouse.com
ITSP.50.104 Guidance on defence in depth for cloud-based services - cyber.gc.ca
Public Cloud Security Breaches
The 2022 Top 7 Cloud Attack Paths - Lightspin
Top 10 Cloud Attacks and What You Can Do About Them - aquasec.com
Credentials stuffing
HackTricks Cloud
Principle of Least Privilege (POLP)
AWS VPC Network Application Protection
Azure Network Security
Azure Confidential Computing
Amazon GuardDuty
AWS Artifact
AWS Compliance Center
Azure Compliance Manager
Microsoft Trust Center
GCP Security Command Center
GCP Compliance Resource Center
HIPAA Reference Architecture on AWS