This is my 2nd Lab Experiment on Azure Purview with private network deployment architecture . You can read the 1st
Continue reading »Author: Prodip Saha
AWS Single Sign-On (SSO) with Azure AD as External Identity Provider (IdP)
Cloud Governance is top most priority of organizations moving (or moved) to Public Cloud. Identity and Access Management (IAM) is
Continue reading »Azure Purview to Discover PII in Azure File/Blob, AWS S3 and More
Azure Purview is a unified data governance service that helps you manage and govern your on-premises, multi-cloud, and software-as-a-service (SaaS)
Continue reading »AWS Cross Account Lambda execution using Cross Account Role (CAR) with least privilege
In this blog post, we will discover how to run (invoke) a Lambda function in source account which in turn
Continue reading »Secure your business api with mTLS, Lambda Authorizer, WAF + Shield at AWS Api Gateway
mTLS stands for Mutual TLS. By default, the TLS protocol only requires a server to authenticate itself to the client.
Continue reading »Deploy Angular App in AWS S3 and .Net Core API in Lambda (server-less)
Thanks to all you for sending congratulatory notes on my attainment of Azure Solutions Architect certification. Cloud is a commodity
Continue reading »Allow Guest Access to Microsoft Teams with Security Controls – Comprehensive Guide.
Are you O365 Administrator or InfoSec Architect? You may be interested to read this post. Some organizations don’t allow guest
Continue reading »Phishing Attacks via Messaging and the problem with internet specifications and standards
We all are familiar with email phishing but attackers are increasingly using other forms of communications since email servers are
Continue reading »AKS- Use Azure AD and RBAC to control access to your Kubernetes Cluster
Information Security professionals, this is one of the powerful capability that you don’t want your organization to miss. Integration of
Continue reading »Security Automation- Protect Azure App Services Applications
It’s been couple of months since I started security automation to stop the bad actors at the front gate and
Continue reading »