<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>awsmatt</title><link>https://awsmatt.com/</link><description>Recent content on awsmatt</description><generator>Hugo</generator><language>en-au</language><lastBuildDate>Sat, 25 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://awsmatt.com/index.xml" rel="self" type="application/rss+xml"/><item><title>D3FEND-AWS: Structured Defensive Mappings for the AWS Threat Technique Catalog</title><link>https://awsmatt.com/posts/d3fend-aws-defensive-technique-mappings/</link><pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/d3fend-aws-defensive-technique-mappings/</guid><description>The AWS Threat Technique Catalog documents how attackers operate in AWS. D3FEND-AWS maps the defensive counterpart — what to detect, harden, and evict — as structured, machine-readable YAML. Open source on GitHub.</description></item><item><title>Behavioural Detection with Automated Agents: The Future of Managed Detection &amp; Response</title><link>https://awsmatt.com/posts/behavioural-detection-automated-agents-mdr/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/behavioural-detection-automated-agents-mdr/</guid><description>Rule-based detection has a ceiling. Behavioural profiling with automated agents catches what static rules miss — especially in cloud environments.</description></item><item><title>SCPs and RCPs: Using Both to Close the Preventive Control Gap</title><link>https://awsmatt.com/posts/scps-rcps-preventive-controls/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/scps-rcps-preventive-controls/</guid><description>Service Control Policies restrict what your principals can do. Resource Control Policies restrict what can be done to your resources. Most AWS organisations use one or neither. Here&amp;rsquo;s why both matter.</description></item><item><title>Correlating GuardDuty Findings with CloudTrail: The Signal Gap Most Teams Miss</title><link>https://awsmatt.com/posts/guardduty-cloudtrail-signal-gap/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/guardduty-cloudtrail-signal-gap/</guid><description>GuardDuty tells you something happened. CloudTrail tells you what happened next. Most teams treat these as separate workflows — and that gap is where attackers complete their objectives.</description></item><item><title>IAM Privilege Escalation in AWS: The Paths Most Teams Miss</title><link>https://awsmatt.com/posts/iam-privilege-escalation-patterns/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/iam-privilege-escalation-patterns/</guid><description>Each step in an IAM privilege escalation chain looks like a routine API call. The attack only becomes visible when you trace the full sequence.</description></item><item><title>AWS Security Research</title><link>https://awsmatt.com/posts/aws-security-research/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/aws-security-research/</guid><description>Introducing awsmatt.com — a home for AWS security research, tools, and practical guides.</description></item><item><title>Background</title><link>https://awsmatt.com/background/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://awsmatt.com/background/</guid><description>&lt;p&gt;Senior cybersecurity and cloud security leader with over 25 years&amp;rsquo; experience across incident response, security architecture, and risk management. Focused on helping organisations secure their AWS environments through practical research, tooling, and hands-on guidance.&lt;/p&gt;
&lt;h2 id="focus-areas"&gt;Focus Areas&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cloud Security&lt;/strong&gt; — AWS security architecture, misconfiguration detection, identity and access management&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Incident Response&lt;/strong&gt; — cloud-native IR, forensics in AWS, playbook development&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security Architecture&lt;/strong&gt; — landing zone design, network segmentation, defence in depth&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity &amp;amp; Access Management&lt;/strong&gt; — IAM policy analysis, privilege escalation paths, federation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Governance &amp;amp; Compliance&lt;/strong&gt; — security frameworks, risk management, audit readiness&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="selected-expertise"&gt;Selected Expertise&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Cloud Infrastructure&lt;/strong&gt;
AWS security services (GuardDuty, Security Hub, IAM Access Analyzer, CloudTrail, Config), infrastructure as code (Terraform, CloudFormation), container security, serverless security patterns.&lt;/p&gt;</description></item></channel></rss>