TrustOnCloud (@trustoncloud) 's Twitter Profile
TrustOnCloud

@trustoncloud

TrustOnCloud provide cloud control catalogs for each Cloud service; based on threat models, audit-ready, and always up-to-date.

ID: 1348723354027450368

linkhttps://www.trustoncloud.com/ calendar_today11-01-2021 20:08:28

167 Tweet

243 Followers

40 Following

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

Cloud services create endless possibilities โ€” and endless threats. TrustOnCloud maps risks and controls across 220+ AWS, Azure & GCP services โ€” in human-readable (PDF, DOCX) and machine-readable (#JSON) formats. ๐ŸŽฅ Watch the 7-minute demo โ†’ trustoncloud.com/on-demand-demo/

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

โ˜๏ธGoogle Cloud #APIs change constantly. New methods. Deprecations. Breaking changes. We built the GCP API Change Log to help you: โœ… Track method-level changes across GCP services โœ… Compare what's new vs. what's removed โœ… Subscribe via RSS ๐Ÿ”—Explore today's changes:

โ˜๏ธ<a href="/googlecloud/">Google Cloud</a> #APIs change constantly. New methods. Deprecations. Breaking changes. 

We built the GCP API Change Log to help you: 
โœ… Track method-level changes across GCP services
โœ… Compare what's new vs. what's removed
โœ… Subscribe via RSS

๐Ÿ”—Explore today's changes:
TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐Ÿ›ก๏ธ Weโ€™ve updated our #ThreatModel coverage on AWS Marketplace. โœ”๏ธ Implement best practices for optimal security and efficiency โœ”๏ธ Tailor controls to match your specific applications and risk tolerance โœ”๏ธ Facilitate seamless onboarding for large enterprises and agencies

๐Ÿ›ก๏ธ Weโ€™ve updated our #ThreatModel coverage on AWS Marketplace.

โœ”๏ธ Implement best practices for optimal security and efficiency 
โœ”๏ธ Tailor controls to match your specific applications and risk tolerance 
โœ”๏ธ Facilitate seamless onboarding for large enterprises and agencies
TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐ŸชฃThink your S3 buckets are locked down? Think again. Our CTO breaks down every identity path that can reach your data and explains how to move from tribal knowledge to governed, repeatable access control. โ–ถ๏ธ Watch the demo: trustoncloud.com/on-demand-demoโ€ฆ #CloudSecurity #S3Security

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

MITRE ATT&CK gives security teams a shared language to understand threats โ€” not just what happened, but why. But most tools stop at labels. Youโ€™re left stitching together context across AWS, Azure, and GCP. At TrustOnCloud, every threat is structured the same way: ๐Ÿ”น What the

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐Ÿšจ Weโ€™re sponsoring fwd:cloudsec North America! ๐Ÿ“ Denver | ๐Ÿ—“ June 30โ€“July 1 ๐Ÿ“Œ Embassy Suites Downtown Catch us at the TrustOnCloud booth โ€” letโ€™s talk threat models, cloud onboarding, or grab some swag ๐Ÿ‘‹ ๐Ÿ”— trustoncloud.com/events/fwdclouโ€ฆ #cloudsecurity #infosec #TrustOnCloud

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

Understand the threat. Then ask: what are we trying to achieve? Thatโ€™s the role of a control objective โ€” a high-level outcome behind a set of controls. It brings structure to your threat model. Next: breaking them down even further. ๐Ÿ‘‡ ๐Ÿ”— trustoncloud.com/on-demand-demo

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐—ก๐—˜๐—ช: ๐—ฅ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜† ๐˜‚๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—ผ๐—ณ ๐—”๐—บ๐—ฎ๐˜‡๐—ผ๐—ป ๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ๐——๐˜‚๐˜๐˜† ๐—ณ๐—ถ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐˜†๐—ฝ๐—ฒ๐˜€. โœ”๏ธ Scraped from AWS docs ๐Ÿ” Updated weekly via GitHub Actions ๐Ÿ“‚ Output: findings.json (structured + automation-ready) ๐Ÿ”— github.com/trustoncloud/aโ€ฆ โญ

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

More controls โ‰  better security. Some threat models have 400+ controls. But which ones should you implement? Ask yourself: โœ”๏ธ Whatโ€™s the ROI? โœ”๏ธ How hard is it to operate? โœ”๏ธ Whatโ€™s the impact on the threat? ๐Ÿ”— trustoncloud.com/on-demand-demo #CloudSecurity #ThreatModeling

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

โœณ๏ธ Refining threats to match your IAM policy? Try IAM Threat Analyzer: ๐Ÿ“ฅ Input a policy ๐Ÿ”Ž See the related threats This helps you ๐—ป๐—ฎ๐—ฟ๐—ฟ๐—ผ๐˜„ ๐—ฑ๐—ผ๐˜„๐—ป ๐˜„๐—ต๐—ฎ๐˜ ๐—ฎ๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฒ๐˜€ โ€” not just a generic list of risks. ๐Ÿ”— trustoncloud.com/on-demand-demo #IAMSecurity

TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐—ง๐—ฟ๐—ฎ๐—ฐ๐—ธ ๐—”๐—ช๐—ฆ ๐—”๐—ฃ๐—œ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ด๐—ฒ๐˜€โ€”๐—ฑ๐—ฎ๐—ถ๐—น๐˜†, ๐—ฎ๐—น๐—น ๐—ถ๐—ป ๐—ผ๐—ป๐—ฒ ๐—ฝ๐—น๐—ฎ๐—ฐ๐—ฒ. awsapichanges.com gives you a live changelog of AWS service API updates. New methods, parameter edits, removalsโ€”captured and summarized without the doc-digging. ๐Ÿ”น Human-readable summaries

๐—ง๐—ฟ๐—ฎ๐—ฐ๐—ธ ๐—”๐—ช๐—ฆ ๐—”๐—ฃ๐—œ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ด๐—ฒ๐˜€โ€”๐—ฑ๐—ฎ๐—ถ๐—น๐˜†, ๐—ฎ๐—น๐—น ๐—ถ๐—ป ๐—ผ๐—ป๐—ฒ ๐—ฝ๐—น๐—ฎ๐—ฐ๐—ฒ.

awsapichanges.com gives you a live changelog of AWS service API updates.

New methods, parameter edits, removalsโ€”captured and summarized without the doc-digging.
๐Ÿ”น Human-readable summaries
TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

Weโ€™re proud to support fwd:cloudsec 2025 - where cloud security practitioners meet, share, and raise the bar together. Weโ€™re giving away tickets to this yearโ€™s conference. Want in? Learn more โ†’ trustoncloud.com/ticket-give-awโ€ฆ #fwdcloudsec25

Weโ€™re proud to support fwd:cloudsec 2025 - where cloud security practitioners meet, share, and raise the bar together.

Weโ€™re giving away tickets to this yearโ€™s conference.

Want in? Learn more โ†’ trustoncloud.com/ticket-give-awโ€ฆ #fwdcloudsec25
TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐ŸŽ™๏ธSecurity You Should Know: Our CTO Tyson Garrett joins Derek Fisher (Temple University) & Davi Ottenheimer (Inrupt) to discuss hidden #Cloud & #SaaS risks + how to tackle them. Listen now:๐ŸŽงtrustoncloud.com/blog/ciso-seriโ€ฆ #CloudSecurity #CISO

๐ŸŽ™๏ธSecurity You Should Know: Our CTO Tyson Garrett joins Derek Fisher (Temple University) &amp; Davi Ottenheimer (Inrupt) to discuss hidden #Cloud &amp; #SaaS risks + how to tackle them. Listen now:๐ŸŽงtrustoncloud.com/blog/ciso-seriโ€ฆ

#CloudSecurity #CISO
TrustOnCloud (@trustoncloud) 's Twitter Profile Photo

๐ŸŽงUnderstanding Cloud Dataflows: 60-sec clip from Security You Should Know CISOseries Listen now:โ–ถ๏ธtrustoncloud.com/blog/ciso-seriโ€ฆ #CloudSecurity #CISOSeries #ThreatModeling