CloudSec Wine
2.14K subscribers
910 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 AWS OIDC Authentication with SPIFFE

How to authenticate data center applications to AWS using automated SPIFFE credentials.

https://developer.squareup.com/blog/aws-oidc-authentication-with-spiffe/

#aws
🔷 Illogical Apps - Exploring and Exploiting Azure Logic Apps

How to obtain sensitive information as an user with the Reader role, and how to identify/abuse API Connection hijack scenarios as a Contributor in Azure Logic Apps.

https://www.netspi.com/blog/technical/cloud-penetration-testing/illogical-apps-exploring-exploiting-azure-logic-apps/

#azure
🔶 Security Implication of Root principal in AWS

An interesting way of abusing the AWS KMS for data exfiltration in restricted VPCs.

https://niebardzo.github.io/2021-08-23-root-principal-in-aws/

#aws
Threat_Hunting_in_the_Cloud_Defending_AWS,_Azure_and_Other_Cloud.pdf
29.1 MB
🔶🔷🔴 Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.

#aws #azure #gcp
🔶 Inside Figma: getting out of the (secure) shell

Tips from the Figma security team to help other teams secure Systems Manager and protect their most sensitive data.

https://www.figma.com/blog/inside-figma-getting-out-of-the-secure-shell/

#aws
🔴 Automate Your Security in GCP with Serverless Computing

Talk exploring serverless open source tools and other cloud-native options that allow you to automate your cloud security without the need for human interaction.

https://youtu.be/jCQTeglIfeI

#gcp
🔷 Coordinated disclosure of vulnerability in Azure Container Instances Service

Microsoft recently mitigated a vulnerability reported by a security researcher in the Azure Container Instances (ACI) that could potentially allow a user to access other customers information in the ACI service. Microsoft's investigation surfaced no unauthorized access to customer data. You can also check the original post disclosing the vulnerability and another that explains What to do? to address it.

https://msrc-blog.microsoft.com/2021/09/08/coordinated-disclosure-of-vulnerability-in-azure-container-instances-service/

#azure
🔴 Bypassing GCP Org Policy with Custom Metadata

Google makes use of custom metadata to authorize access to AI Notebooks and their web UIs. Individuals granted access via custom metadata need not have any IAM permissions on the compute instance, on the service account running the Notebook or even be a member of the Organization. This kind of authorization bypasses a specific Organization Policy Constraint which restricts cross-domain resource sharing.

https://kattraxler.github.io/gcp/hacking/2021/09/10/gcp-org-policy-bypass-ai-notebooks.html

#gcp
🔶 AWS Authentication: Principals in AWS IAM

Newcomers to AWS can sometimes get confused by what it means to have AWS credentials. This article aims to explain the basics of AWS authentication, that is, the way you gain an identity that you can use to access AWS services.

https://ben11kehoe.medium.com/principals-in-aws-iam-38c4a3dc322a

#aws
🔷 Agent Exposes Azure Customers To Unauthorized Code Execution

Azure customers on Linux machines - which account for over half of all Azure instances according to Microsoft - are at risk if they use any of the services relying on OMI (Open Management Infrastructure), a Windows Management Infrastructure (WMI) for UNIX/Linux systems. The RCE is the simplest RCE you can ever imagine: simply remove the auth header and you are root. This Twitter thread is also useful to understand the impact of this flaw.

https://www.wiz.io/blog/secret-agent-exposes-azure-customers-to-unauthorized-code-execution

#azure
🔶 IAM Vulnerable - An AWS IAM Privilege Escalation Playground

The IAM Vulnerable tool helps you learn how to identify and then exploit intentionally vulnerable IAM configurations that allow for privilege escalation.

https://labs.bishopfox.com/tech-blog/iam-vulnerable-an-aws-iam-privilege-escalation-playground

#aws
🔶 AWS federation comes to GitHub Actions

GitHub Actions has a new functionality that can vend OpenID Connect credentials to jobs running on the platform. This is very exciting for AWS account administrators as it means that CI/CD jobs no longer need any long-term secrets to be stored in GitHub.

https://awsteele.com/blog/2021/09/15/aws-federation-comes-to-github-actions.html

#aws
🔶 CVE-2021-38112: AWS WorkSpaces Remote Code Execution

A vulnerability in the AWS WorkSpaces desktop client (CVE-2021-38112), which allows commands to be executed if a victim opens a malicious WorkSpaces URI from their browser.

https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/

#aws
🔷 Escalating Azure Privileges with the Log Analytics Contributor Role

A (now fixed) privilege escalation that allowed an Azure AD user to escalate from the Log Analytics Contributor role to a full Subscription Contributor role.

https://www.netspi.com/blog/technical/cloud-penetration-testing/escalating-azure-privileges-with-the-log-analystics-contributor-role/

#azure
🔶 Revisiting Lambda Persistence

As an attacker, Serverless environments are a very different target when compared with their traditional server-based counterparts. Even gaining remote code execution, which would normally spur a race to escalate privileges, has a very different connotation.

https://frichetten.com/blog/revisiting_lambda_persistence/

#aws
🔷 10 Common Security Issues when Migrating from On Premises to Azure

This article is focused on the security risks involved in a cloud migration, and provides a compilation of common security anti-patterns and best practices for architects only familiar with traditional on-premise data centers to follow.

https://www.praetorian.com/blog/migrating-to-azure/

#azure
🔶 Control The Blast Radius Of Your Lambda Functions With An IAM Permissions Boundary

A great benefit of building Lambda-based applications is that the security best practice of least privilege can be applied at a very granular level, the individual Lambda function.

https://www.iampulse.com/t/control-the-blast-radius-of-your-lambda-functions-with-an-iam-permissions-boundary

#aws