Sign up for our newsletter! →

AWS re:Invent 2025 Security Announcements

AWS re:Invent 2025 is officially in the books. The headlines are all about agentic AI, Nova models, and AI factories, but if you are in the business of securing your environments you may be asking a more practical question: “What from this week actually moves the needle on security and compliance?”

Resiliency Strategies for AWS

The day is October 20, 2025, and the most recent major AWS outage is fresh in my mind. Around 3 am EDT, AWS began investigating the incident affecting the us-east-1 region. This story is one that’s played out many times before–a widespread outage in one region or another affecting multiple companies’ primary hosting region.

Detecting and Protecting PII in AWS in 2025

Patrick Davis Principal Security Consultant Blog Graphic

Cloud services offer on-demand, scalable computing resources, making them invaluable for handling large datasets, including sensitive information like Personally Identifiable Information (PII) and Protected Health Information (PHI)…

If A Secret Rotates In The Woods, Will Anyone Hear It?

While GCP provides a built-in mechanism for scheduling secret rotation, the actual implementation is left to you. After defining strategies for secret rotation, we’ll walk through some examples of how you can implement these strategies…

Terraform Best Practices

Jenny Tang's blog graphic about Terraform

Terraform is a popular tool that allows developers to manage resources and collaboratively deploy infrastructure as code (IaC) for cloud technologies. It enables organizations to define, provision, and manage cloud resources in a consistent and automated way. Following best practices effectively is essential to ensure that Terraform configurations are reliable, maintainable, and secure…

From AFT to ATO: The Prequel

Michael Greenlaw HanaByte blog on AFT to ATO

The purpose of this installment was originally to continue our journey; however, I was fortunate enough to speak on this topic in-depth at HashiTalks. Due to its technical nature, we thought it better to complete the blog series by taking a step back and providing a discussion about what the tool is, the problems it solves, and how it can empower us…

Introducing the Power of AI Security in GCP

hanabyte blog, google cloud partner, AI, hanabyte,

In today’s rapidly evolving world, we recognize the immense potential of artificial intelligence (AI) across many different Industries. Google Cloud Platform (GCP) has harnessed the power of Generative AI to bring cutting-edge security capabilities to the forefront. By centralizing security findings in a streamlined and efficient manner, GCP is revolutionizing the way organizations approach cybersecurity…

A Look at the Modernizing FedRAMP Memo

hanabyte blog, FedRAMP, HanaByte

The White House Office of Management and Budget (OMB) released a draft memorandum with the goals of enhancing the Federal Risk and Authorization Management Program, widely known as FedRAMP. In this blog post, we will go through a brief background on FedRAMP, then dive into the details of the OMB memo, and what it means for the future of FedRAMP…

From AFT to ATO, AWS Native FedRAMP Compliance through Terraform (Part 1)

hanabyte blog, aws account factory, decoupling security data, snowflake

The complexity of achieving a FedRAMP status in this sea of ever-growing cloud architectures, often led us and customers to the same conclusion: new accounts! Why go through the process of updating the entirety of their current architecture, when we only need resources in the authorization boundary to be compliant?…