How-To Guides


How to Ensure NIST CSF Compliance in AWS Environments
Learn how to apply the NIST Cybersecurity Framework to AWS environments. Find out how to enhance security by aligning AWS with NIST CSF standards.
How to Ensure NIST CSF Compliance in AWS Environments
Learn how to apply the NIST Cybersecurity Framework to AWS environments. Find out how to enhance security by aligning AWS with NIST CSF standards.


Secure Your GCP Account with Forseti Security Controls
Learn how to check your GCP environment for security gaps with Forseti Security Controls. Find out how to maintain a strong security posture for your organization.
Secure Your GCP Account with Forseti Security Controls
Learn how to check your GCP environment for security gaps with Forseti Security Controls. Find out how to maintain a strong security posture for your organization.


Align Your AWS Account with FFIEC Cybersecurity Standards
Ensure your AWS environment complies with FFIEC cybersecurity standards. This guide shows you how to check and enable required controls.
Align Your AWS Account with FFIEC Cybersecurity Standards
Ensure your AWS environment complies with FFIEC cybersecurity standards. This guide shows you how to check and enable required controls.


How to Detect and Remediate Okta Impossible Traveler Alerts
Learn how to detect and remediate 'impossible traveler' alerts in Okta, investigating suspicious logins from different locations.
How to Detect and Remediate Okta Impossible Traveler Alerts
Learn how to detect and remediate 'impossible traveler' alerts in Okta, investigating suspicious logins from different locations.


How to Check if All Azure Users Have MFA Enabled
Ensure Azure security by verifying that MFA is enabled for all users. Discover how to find and remove any non-compliant accounts step-by-step.
How to Check if All Azure Users Have MFA Enabled
Ensure Azure security by verifying that MFA is enabled for all users. Discover how to find and remove any non-compliant accounts step-by-step.


Azure Storage Account Encryption: How-to Guide
Verify the encryption status of Azure Storage Accounts and remediate non-compliance. Follow our guide to secure your data properly.
Azure Storage Account Encryption: How-to Guide
Verify the encryption status of Azure Storage Accounts and remediate non-compliance. Follow our guide to secure your data properly.


How to Secure Google Drive Files with Excessive Permissions
Learn how to secure your organization's Google Drive by identifying and managing publicly-exposed or overly-permissive files
How to Secure Google Drive Files with Excessive Permissions
Learn how to secure your organization's Google Drive by identifying and managing publicly-exposed or overly-permissive files


How to Check Your Azure Account Against the CIS Benchmark
Learn how to use the CIS benchmarks report to check and enforce security best practices in your Azure account.
How to Check Your Azure Account Against the CIS Benchmark
Learn how to use the CIS benchmarks report to check and enforce security best practices in your Azure account.


How to Find and Update Public EC2 AMIs in AWS
Secure your AWS account by finding and updating public AMIs to private. Learn how to prevent exposure of sensitive application information.
How to Find and Update Public EC2 AMIs in AWS
Secure your AWS account by finding and updating public AMIs to private. Learn how to prevent exposure of sensitive application information.


Investigating Suspicious Events in Okta: Security Tips
Learn how to identify and respond to suspicious events in Okta. Discover effective strategies and automations to enhance security and reduce alert fatigue.
Investigating Suspicious Events in Okta: Security Tips
Learn how to identify and respond to suspicious events in Okta. Discover effective strategies and automations to enhance security and reduce alert fatigue.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.