PS Product SecurityKnowledge Base

Infrastructure and Cloud Security

Infrastructure and Cloud Security

Section focus: Infrastructure and Cloud Security.
Best use: start with the section map below, then move into the deeper pages that match your role or stack.
Design note: this index was refreshed to act as a cleaner GitBook landing page instead of a plain directory listing.

Start with these pages

Page Why open it first
AWS IAM and Role Design High-value page inside Infrastructure and Cloud Security.
AWS IAM Snippet Pack High-value page inside Infrastructure and Cloud Security.
โ˜๏ธ Cloud Security Across AWS, Azure, and GCP High-value page inside Infrastructure and Cloud Security.
๐ŸŸง AWS Security Baseline and Top Misconfigurations High-value page inside Infrastructure and Cloud Security.
๐ŸŸฆ Azure Security Baseline and Top Misconfigurations High-value page inside Infrastructure and Cloud Security.
๐ŸŸจ GCP Security Baseline and Top Misconfigurations High-value page inside Infrastructure and Cloud Security.
๐Ÿงฑ Terraform Security Scanning and Checkov High-value page inside Infrastructure and Cloud Security.
๐Ÿ›ก๏ธ Security as Policy for Terraform and Infrastructure as Code High-value page inside Infrastructure and Cloud Security.
๐Ÿ” Mozilla SOPS: age, KMS, and GitOps-Friendly Secret Workflows High-value page inside Infrastructure and Cloud Security.
๐Ÿ›ก๏ธ AWS WAF โ€” Practical Baseline for Managed Rules, Rate Limits, and Logging High-value page inside Infrastructure and Cloud Security.
๐Ÿ” Internal PKI for Microservices โ€” mTLS, Certificate Automation, and Trust Distribution High-value page inside Infrastructure and Cloud Security.
๐Ÿ”‘ AWS and Azure KMS / HSM Key Management Patterns Practical patterns for key hierarchy, envelope encryption, rotation, usage separation, and KMS/HSM operations.
โ˜๏ธ Cloud Environment Security โ€” IAM, Network, Storage, Service Configurations, Visibility, Posture, and Blast Radius High-value page inside Infrastructure and Cloud Security.
๐Ÿงฑ Apache, NGINX, Kafka, Redis, MySQL, MariaDB, and RabbitMQ Hardening Practical hardening map across web, messaging, cache, and database layers, including privileged-user oversight.
๐Ÿ—„๏ธ Database Activity Monitoring, Immutable Logging, and Privileged Session Management Practical control model for database evidence, WORM storage, and admin-session oversight.

Intro: This section ties identity, infrastructure as code, cloud posture, Linux, and secret management into one operator-friendly track. The goal is to keep the narrative anchored in repeatable controls and repeatable failure modes.

What this page includes

  • IAM and cloud posture across AWS, Azure, and GCP
  • Terraform scanning and policy-as-code
  • Linux and automation baselines
  • cross-links into new architecture, identity, and detection sections

โ˜๏ธ Core pages in this section


Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.