Archives for Uncategorized
WFH and Remote Access Security Risks
Mitigation - Important multi-factor authentication automatic session timeouts and access monitoring Unauthorized access to devices Any machine that is capable of connecting to your network should be protected using multi-factor…
More on AAD Guest Users
(Also read AAD B2B External Users and Apps Visible in MyApps) Per Microsoft's Documentation Member: This value indicates an employee of the host organization and a user in the organization's…
Who Logged in to the GCP Console? And When?
How do I see who logged in and when? (Also see, Monitoring in GCP ) Logs Viewer is one stop shop for viewing all log activity on GCP. Two places…
Custom Roles in GCP
Before we get to custom roles, let us talk about why we need custom roles in GCP (Also read, Service accounts and bindings in GCP). The first use case is…