<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Elkana Lang'at</title><link>https://elkana-langat.github.io/categories/security/</link><description>Recent content in Security on Elkana Lang'at</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>elkanahlangatt@gmail.com (Elkana Lang'at)</managingEditor><webMaster>elkanahlangatt@gmail.com (Elkana Lang'at)</webMaster><copyright>© 2026 Elkana Lang'at</copyright><lastBuildDate>Sun, 01 Dec 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://elkana-langat.github.io/categories/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Least-Privilege IAM Patterns: From Theory to Practice</title><link>https://elkana-langat.github.io/blog/least-privilege-iam-patterns/</link><pubDate>Sun, 01 Dec 2024 00:00:00 +0000</pubDate><author>elkanahlangatt@gmail.com (Elkana Lang'at)</author><guid>https://elkana-langat.github.io/blog/least-privilege-iam-patterns/</guid><description>A comprehensive guide to implementing least-privilege IAM across cloud platforms, covering policy design patterns, common pitfalls, and practical checklists.</description></item></channel></rss>