AWS Identity and Access Management (IAM) is one of the few services at the backbone of almost every…
Set up infrastructure as code (IaC) security to gain the benefits of speed, scalability, cost-savings, and hardened cloud security posture.
Learn how to automate security scanning of Helm charts for Kubernetes misconfigurations with Bridgecrew's open-source scanner, Checkov.
Our case study with Databricks shows how Bridgecrew enabled them to right-size their IAM through automation and the implementation of security-as-code.
Learn why modern cloud-native needs call for solutions in infrastructure as code over the traditional CSPM model.
Learn how to assess your current cloud security needs, design a plan to get cloud visibility, implement cloud security automation processes, and press play!
We sit down with Corcoran Smith from Slalom to discuss new Checkov developments, enterprise DevSecOps challenges, and infrastructure as code solutions.
In this blog post, we cover the most common AWS misconfigurations, their associated risks, and how to fix them before deployment.
Leverage the inherent benefits of infrastructure as code to strengthen your cloud security, save money, and enhance DevSecOps collaboration.
Automatically detect AWS IAM drift and manage access with AirIAM and GitHub Actions.
Learn how to secure your AWS CloudFormation templates with Bridgecrew's continuous scanning, monitoring, and easy remediation.
Catch up with the the latest open source and cloud security updates in Episode 02 of Bridgecrew's #CodifedSecurity Office Hours.