Azure Cloud review — Finding User role mapping in Azure Active directoryUser role mapping is an important aspect of Azure Active Directory (AAD) that enables you to control access to resources and services in…Mar 12, 2023Mar 12, 2023
DNS and Proxy Bypass — Discover Original IP address of a website.Most of the time when we are performing a penetration test, we do not find the actual IP address of the website because it is hidden with…Feb 7, 2023Feb 7, 2023
Azure Security Design to Prevent Attacks — Use casesIn this article, I am going to walk through few use cases to protect Azure cloud environment by security design and enabling features…Nov 20, 2021Nov 20, 2021
Data Security in Cloud — Securing AWS and Azure dataData security in the cloud can be classified into two broad categories:Oct 19, 2021Oct 19, 2021
Managing Hybrid environments with AzureThe original post of mine is available at https://www.gopithecheeta.com/post/managing-hybrid-environments-with-azureSep 30, 2021Sep 30, 2021
Azure AD — Access On-Prem Web Application with Secure Remote AccessAssume you have web application which is deployed in on-prem and you decided to the web application access with Multifactor authentication…Sep 27, 2021Sep 27, 2021
Securing Azure data — Hardening the storage accountIn this article, we cover on Azure storage account and how to secure using recommended storage account policiesSep 26, 2021Sep 26, 2021
Control and Manage AWS costs efficientlyThere are many organizations looking for ways to find control the Cloud cost. Its very challenging to maintain and monitor the consumption…Oct 30, 2020Oct 30, 2020