<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on awsmatt</title><link>https://awsmatt.com/posts/</link><description>Recent content in Posts on awsmatt</description><generator>Hugo</generator><language>en-au</language><lastBuildDate>Sat, 25 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://awsmatt.com/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>D3FEND-AWS: Structured Defensive Mappings for the AWS Threat Technique Catalog</title><link>https://awsmatt.com/posts/d3fend-aws-defensive-technique-mappings/</link><pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/d3fend-aws-defensive-technique-mappings/</guid><description>The AWS Threat Technique Catalog documents how attackers operate in AWS. D3FEND-AWS maps the defensive counterpart — what to detect, harden, and evict — as structured, machine-readable YAML. Open source on GitHub.</description></item><item><title>Behavioural Detection with Automated Agents: The Future of Managed Detection &amp; Response</title><link>https://awsmatt.com/posts/behavioural-detection-automated-agents-mdr/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/behavioural-detection-automated-agents-mdr/</guid><description>Rule-based detection has a ceiling. Behavioural profiling with automated agents catches what static rules miss — especially in cloud environments.</description></item><item><title>SCPs and RCPs: Using Both to Close the Preventive Control Gap</title><link>https://awsmatt.com/posts/scps-rcps-preventive-controls/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/scps-rcps-preventive-controls/</guid><description>Service Control Policies restrict what your principals can do. Resource Control Policies restrict what can be done to your resources. Most AWS organisations use one or neither. Here&amp;rsquo;s why both matter.</description></item><item><title>Correlating GuardDuty Findings with CloudTrail: The Signal Gap Most Teams Miss</title><link>https://awsmatt.com/posts/guardduty-cloudtrail-signal-gap/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/guardduty-cloudtrail-signal-gap/</guid><description>GuardDuty tells you something happened. CloudTrail tells you what happened next. Most teams treat these as separate workflows — and that gap is where attackers complete their objectives.</description></item><item><title>IAM Privilege Escalation in AWS: The Paths Most Teams Miss</title><link>https://awsmatt.com/posts/iam-privilege-escalation-patterns/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/iam-privilege-escalation-patterns/</guid><description>Each step in an IAM privilege escalation chain looks like a routine API call. The attack only becomes visible when you trace the full sequence.</description></item><item><title>AWS Security Research</title><link>https://awsmatt.com/posts/aws-security-research/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://awsmatt.com/posts/aws-security-research/</guid><description>Introducing awsmatt.com — a home for AWS security research, tools, and practical guides.</description></item></channel></rss>