Guidance

Best practices and defensive strategies for securing cloud environments.

SkySiege’s Guidance articles provide practical, defensive direction for reducing cloud risk. These articles break down common failure points and show how to prevent them - before they turn into incidents.

Expect:

Guidance is proactive, not reactive. Use it to strengthen your environment, close gaps and standardise secure practices across teams.

Guidance Articles

Reference: Insider Domain Trading

Reference: Insider Domain Trading

Test A-R53-11 specifically looks for Domains that do not have a transfer lock enabled. A transfer lock is nothing more than an additional step ahead of transferring a domain to ensure a “belt …

A Good General AWS Password Policy

A Good General AWS Password Policy

The AWS Password Policy dictates the security standards and management of AWS IAM User passwords used for access to the AWS Console. We extend the default policy to increase security and minimise …

AWS Security Assessment

AWS Security Assessment

An AWS security assessment evaluates the security posture of an AWS account, analysing the cloud resources contained in an account and their configuration. The goal of this assessment is to find any …

Multi-cloud Design Patterns

In our previous article, we explored the benefits of adopting a multi-cloud architecture. In this article, we’ll deliver as promised some introductory architectures that can serve as your …

What is Multi-cloud?

What is Multi-cloud?

Leveraging multi-cloud technologies and architectural patterns is becoming an increasingly important part of modern technology architecture. Whilst multi-cloud approaches offer numerous advantages, …

Does AWS Allow Penetration Testing

Does AWS Allow Penetration Testing

If you are hosting applications on Amazon Web Services (AWS), it is important to consider the impact to AWS from your penetration testing. A key aspect of this consideration is determining whether …

Cloud Firewalls

Cloud Firewalls

Cloud providers come with built-in firewalls and firewall rules that control traffic routes and access to cloud resources. Proper configuration management of these firewall rules is absolutely …

AWS Penetration Testing

AWS Penetration Testing

Cloud penetration testing is a specialised form of penetration testing that focuses on identifying vulnerabilities in the infrastructure, configuration, and accessibility of cloud resources. Regular …

What is Automated Penetration Testing

What is Automated Penetration Testing

Automated penetration testing differs from regular penetration testing by utilising a set of tools and services that continuously test applications to identify and exploit both new and old …