Learn cloud governance best practices to manage risk, enforce policies, and improve security, compliance, and cost control in the cloud.| Spacelift
Understand cloud compliance, how it works, and how to achieve it in AWS, Azure, and Google Cloud with this in-depth resources guide.| Sysdig
Learn what tools and data sources you need to use in cloud forensics investigation and how they come into practice in a real-life example.| wiz.io
An outline of the cloud security differences of AWS, Azure, and GCP| https://www.chrisfarris.com/
A constant source of pain in Google Cloud Platform (GCP) and everywhere else is the amount of unmaintained resources: idle virtual machines, old buckets, IAM policies, DNS records and so on. They contribute to the attack surface and the chance of a vulnerability increase with time. Shutting off resources is a such a low hanging fruit from a risk perspective that as a security engineer you should make it a daily habit. After all the most secure computer is the one that’s been turned off!| cloudberry.engineering