CloudSec Wine
2.13K subscribers
908 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔸AWS access keys leak in GitHub repository and some improvements in Amazon reaction

Post testing Amazon's reaction to a case of leaked access keys, with analysis of the recent "AWSCompromisedKeyQuarantine" policy used to contain them.

https://rzepsky.medium.com/aws-access-keys-leak-in-github-repository-and-some-improvements-in-amazon-reaction-cc2e20e89003

🔸Learning from AWS (Customer) Security Incidents

Really interesting run through of real life security breaches that have happened to the AWS environments of high profile companies.

https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents

#aws
🔸AWS Control Tower By Example

A hands-on walk-through of the the easiest way to set up and govern a secure, compliant, multi-account AWS environment based on best practices.

#aws
🔷 awesome-azure-security

A curated list of awesome Microsoft Azure Security tools, guides, blogs, and other resources.

https://github.com/kmcquade/awesome-azure-security

#azure
🔹Privilege Escalation in AKS Clusters

Read access to ConfigMaps by default allowed privilege escalation in Microsoft's Kubernetes AKS.

https://medium.com/sse-blog/privilege-escalation-in-aks-clusters-18222ab53f28

#azure
🔸"I took a first pass at mapping out how AWS security services all connect to one another and where to categorize them."

https://twitter.com/0xdabbad00/status/1336494125617541120

#aws
🔸Netflix/consoleme

New tool from the Netflix cloud security team that “strives to be a multi-account AWS swiss-army knife, making AWS easier for your end-users and cloud administrators.”

- Consolidates the management of multiple accounts into a single web UI.
- Allows your end-users and admins to get credentials / console access to your different AWS accounts, depending on their authorization level.
- Provides mechanisms for end-users and admins to both request and manage permissions for IAM roles, S3 buckets, SQS queues, and SNS topics.
- A self-service wizard is also provided to guide users into requesting the permissions they desire.

https://github.com/Netflix/consoleme

#aws
🔴Google Cloud Platform (GCP) Service Account-based Privilege Escalation paths

The Praetorian team uncovered a GCP risk scenario in which privileges in a compromised service can be used to further escalate privileges.

https://www.praetorian.com/blog/google-cloud-platform-gcp-service-account-based-privilege-escalation-paths

#gcp
🔸Lesser Known Techniques for Attacking AWS Environments

"This post will discuss lesser known attack techniques that I would use in attacking AWS accounts and conclude with a discussion of defenses. A common theme among many of these concepts is abusing trust, whether that is incorrectly trusting attacker controlled resources hosted on AWS, or the trust relationships between accounts or within an account.

I’ll discuss a few techniques in gaining initial access, recon, lateral movement between accounts, and data exfiltration."

https://tldrsec.com/blog/lesser-known-aws-attacks/

#aws
🔹CrowdStrike Reporting Tool for Azure (CRT)

A tool which helps organizations quickly and easily review excessive permissions in their Azure AD environments, helps determine configuration weaknesses, and provides advice to mitigate risk.

https://github.com/CrowdStrike/CRT

#azure
Aqua_CSPM_Cloud_Security_Posture_Management_Guide.pdf
3.2 MB
The Essential Guide to Cloud Security Posture Management

How CSPM automates security configuration across clouds

"Cloud Security Posture Management, or CSPM, is a relatively new cloud security
category designed to address configuration and compliance risks in your cloud infrastructure. The concept of CSPM is to enable organizations to automatically discover, assess, and remediate security configuration issues and gaps across multiple cloud providers and accounts. This approach ensures that at any given moment you have a consistent, secure, and compliant cloud infrastructure."

https://info.aquasec.com/cspm-essential-guide

#aws #gcp #azure
aws_security_maturity_roadmap 2021.pdf
273.5 KB
🔸AWS Security Maturity Roadmap 2021

The third annual release of Scott Piper’s excellent guide for securely running on AWS. Probably one of the best, concise, actionable guides on this I know of.

https://summitroute.com/blog/2021/01/12/2021_aws_security_maturity_roadmap_2021/

#aws
🔸Auditing PassRole: A Problematic Privilege Escalation Permission

iam:PassRole is an AWS permission that enables critical privilege escalation; many supposedly low-privilege identities tend to have it. The PassRole permission requirement is ubiquitous. It extends to more than 300 actions in more than 90 services and, in some cases, is obscured by parameters that indirectly contain the role being passed. Comprehensively auditing it can be a handful but is absolutely worth it as not doing so means leaving relatively easy avenues for privilege escalation wide open.

https://ermetic.com/whats-new/blog/auditing-passrole-a-problematic-privilege-escalation-permission/

#aws
🔸Top Ten Security Updates from AWS re:Invent 2020

AWS re:Invent ran for three weeks last year. It is more important than ever to help everyone by summarizing AWS' biggest security announcements.

https://www.linkedin.com/pulse/top-ten-security-updates-from-aws-reinvent-2020-phil-rodrigues/

#aws