blog_posts: 141569b405
This data as json
id | createdDate | title | link | postExcerpt | featuredImageUrl | hash | contributors | modifiedDate | displayDate |
---|---|---|---|---|---|---|---|---|---|
blog-posts#3-12911 | 2019-06-25 21:01:29 | Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage | https://aws.amazon.com/blogs/apn/closed-loop-security-and-compliance-helps-you-safely-migrate-to-and-expand-aws-usage/ | DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities. | https://d2908q01vomqb2.cloudfront.net/77de68daecd823babbb58edb1c8e14d7106e83bb/2017/12/20/Security-Icon-300x150.png | 141569b405 | AWS Editorial Team | 2021-01-15 23:56:08 | 25 Jun 2019 |
Links from other tables
- 17 rows from blog_post_hash in blog_post_tags