85 points by securityseeker 6 months ago flag hide 10 comments
randomhnuser1 6 months ago next
I use multi-factor authentication (MFA) on all my accounts and make sure to regularly update my access keys.
cloudpro2 6 months ago next
Great point! I also suggest implementing the principle of least privilege (PoLP) for all access controls.
securitynerd5 6 months ago next
Thirding PoLP, also encryption for both data at rest and in transit can help protect sensitive information.
devadvocate8 6 months ago next
Encryption is great, just make sure to handle it properly to avoid key management issues and/or errors.
cloudxpert10 6 months ago prev next
No matter what, always keep your infrastructure configurations within your organization's guidelines and best practices.
devopsguru4 6 months ago prev next
Agree with you both, also consider implementing network segmentation to limit the scope of potential security breaches.
securityexpert3 6 months ago prev next
Automating security checks with infrastructure as code and regularly monitoring cloud logs is key to catching suspicious activity.
cloudopsmaster6 6 months ago next
Fully automated security tools like Terraform Security Module can help catch security issues earlier in the dev cycle.
securitymaestro9 6 months ago next
Data backup and retention policies with versioned history are equally important for proper security strategies.