Mar 12Azure Cloud review — Finding User role mapping in Azure Active directoryUser role mapping is an important aspect of Azure Active Directory (AAD) that enables you to control access to resources and services in your organization. It allows you to assign specific roles to users or groups within your AAD tenant, based on their responsibilities, job functions, and other criteria. Here…5 min read5 min read
Feb 7DNS and Proxy Bypass — Discover Original IP address of a website.Most of the time when we are performing a penetration test, we do not find the actual IP address of the website because it is hidden with cloud proxy services. Sometimes, if I find the original domain name of a website, it may help me discover other websites that are…Cloud Security4 min readCloud Security4 min read
Nov 20, 2021Azure Security Design to Prevent Attacks — Use casesIn this article, I am going to walk through few use cases to protect Azure cloud environment by security design and enabling features available with Azure. …Azure5 min readAzure5 min read
Oct 19, 2021Data Security in Cloud — Securing AWS and Azure dataData security in the cloud can be classified into two broad categories: Protecting data at rest Protecting data in transit Data security has many components that help in securing data in multiple ways; I will walk through the major components available with both AWS and Azure Before going in deep…AWS11 min readAWS11 min read
Sep 30, 2021Managing Hybrid environments with AzureThe original post of mine is available at https://www.gopithecheeta.com/post/managing-hybrid-environments-with-azure If you are using Azure and you are workloads are deployed in multi cloud like AWS, GCP and on premises. So obviously looking for simple solution to manage workloads from Azure Yes, there is a solution in Azure and we are…Cloud3 min readCloud3 min read
Sep 27, 2021Azure AD — Access On-Prem Web Application with Secure Remote AccessAssume you have web application which is deployed in on-prem and you decided to the web application access with Multifactor authentication and accessed securely by remote users Here is the solution with Azure AD, Azure Active Directory’s Application Proxy provides secure remote access to on-premises web applications. After a single…Azure2 min readAzure2 min read
Sep 26, 2021Securing Azure data — Hardening the storage accountIn this article, we cover on Azure storage account and how to secure using recommended storage account policies What is Storage account in Azure? An Azure storage account contains all of your Azure Storage data objects: blobs, file shares, queues, tables, and disks. …Cloud Storage7 min readCloud Storage7 min read
Nov 25, 2020AWS Network FirewallWhat is AWS Network Firewall? Managed service from AWS that provides network protections for all VPCs and having rule engine which let us define the firewall rules, import rules already written in common open source rule formats as well as enable integrations with managed intelligence feeds sourced by AWS partners. …2 min read2 min read
Nov 6, 2020Managing Large Azure Deployments with Azure BlueprintManaging Large Azure Deployments with Azure Blueprint Azure Blueprint Infrastructure as code (IaC) emerged to made Architect and design jobs easy, deploying a cloud infrastructure no longer critical task. There are tools like Terraform, AWS CloudFormation are making the life easy of Architects. Microsoft has ARM templates for deploying the…4 min read4 min read
Oct 30, 2020Control and Manage AWS costs efficientlyThere are many organizations looking for ways to find control the Cloud cost. Its very challenging to maintain and monitor the consumption of resources for each cloud provider unless you have solid Cloud Financial Management (CMF) Framework. …Python5 min readPython5 min read