CloudSec Wine
2.13K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔷 Modernizing compliance: Introducing Risk and Compliance as Code

Google announced the launch of their Risk and Compliance as Code (RCaC) Solution. The RCaC solution stack enables compliance and security control automation through a combination of Google Cloud Products, Blueprints, Partner Integrations, workshops and services.

https://cloud.google.com/blog/products/identity-security/risk-and-compliance-as-code

#azure
🔶 pre:Invent 2021

There were 234 AWS announcements in pre:Invent season. Chris Farris analysed 27 of them related to security and governance.

https://www.chrisfarris.com/post/preinvent2021/

#aws
🔶🔷🔴 AWS/Azure/GCP Permissions

Continuing with efforts on the permissions.cloud project, Ian Mckay has now have both Azure and GCP spaces available: azure.permissions.cloud and gcp.permissions.cloud.

https://aws.permissions.cloud/

#aws #azure #gcp
🔶 twistlock/splash

By Palo Alto Networks’s Yuval Avrahami: A pseudo shell re-invoking the Lambda for each command. For curious fellows who want to hack on AWS Lambda’s infrastructure.

https://github.com/twistlock/splash

#aws
🔴 Illicit coin mining, ransomware, APTs target cloud users in first Google Cybersecurity Action Team Threat Horizons report

The first threat report from the Google Cybersecurity Action Team finds cloud users are often targeted by illicit coin mining, ransomware, and APTs.

https://cloud.google.com/blog/products/identity-security/coin-mining-ransomware-apts-target-cloud-gcat-report

#gcp
🔷 Azure Privilege Escalation via Azure API Permissions Abuse

How Azure API Permissions can be abused to escalate to Global Admin.

https://posts.specterops.io/azure-privilege-escalation-via-azure-api-permissions-abuse-74aee1006f48

#azure
🔶 Data Perimeter Workshop

This workshop takes you through some of the best practices and available AWS services and features for creating a boundary around your resources in AWS.

https://data-perimeter.workshop.aws/

#aws
🔶 IAM roles for Kubernetes service accounts - deep dive

How IAM and Kubernetes work together allowing you to call AWS services from your pods with no hussle.

https://mjarosie.github.io/dev/2021/09/15/iam-roles-for-kubernetes-service-accounts-deep-dive.html

#aws
🔶 AWS Policy as Code Workshop

This workshop explores how to codify a set of rules that make up a policy, use a DevSecOps workflow to quickly address policy issues, and redeploy a policy compliant workload.

https://catalog.us-east-1.prod.workshops.aws/v2/workshops/9da471a0-266a-4d36-8596-e5934aeedd1f/en-US/

#aws
🔶🔷🔴 Cloud service provider security mistakes

Cloud historian Scott Piper has created a GitHub repo to catalogue security mistakes by cloud service providers (AWS, GCP, and Azure); that is, public mistakes on the cloud providers’ side of the shared responsibility model. Includes CVEs, SOC 2 Type 2 failures, security researchers compromising managed services, and more.

https://github.com/SummitRoute/csp_security_mistakes

#aws #azure #gcp
🔴 Over-Privileged Service Accounts Create Escalation of Privileges and Lateral Movement in Google Cloud

There are standard best practices for service accounts but many GCP environments lag behind in implementing these best practices. This research shown how these violations in best practices can allow attackers to chain together attack steps to gain broader access to resources in a GCP environment.

https://www.netskope.com/blog/over-privileged-service-accounts-create-escalation-of-privileges-and-lateral-movement-in-google-cloud

#gcp
🔶 AWS SageMaker Jupyter Notebook Instance Takeover

An attacker can run any code on a victim's SageMaker JupyterLab Notebook Instance across accounts. This means that an attacker can access the Notebook Instance metadata endpoint and steal the access token for the attached role.

https://blog.lightspin.io/aws-sagemaker-notebook-takeover-vulnerability

#aws
🔴 Using Google Cloud Service Account impersonation in your Terraform code

This blog details different ways to authenticate as a service account in Terraform code using short-lived credentials.

https://cloud.google.com/blog/topics/developers-practitioners/using-google-cloud-service-account-impersonation-your-terraform-code

#gcp
🔶 Snaring the Bad Folks

Blog post introducing Snare, Netflix's Detection, Enrichment, and Response platform for handling cloud security related findings. Snare is responsible for receiving millions of records a minute, analyzing, alerting, and responding to them.

https://netflixtechblog.com/snaring-the-bad-folks-66726a1f4c80

#aws
🔴 Best practices for using workload identity federation

This guide presents best practices for deciding when to use workload identity federation, and how to configure it in a way that helps you minimize risks.

https://cloud.google.com/iam/docs/best-practices-for-using-workload-identity-federation

#gcp
🔶🔷🔴 Cloud Security Remediation Guides

CloudSploit's remediation guides are intended to be an open-source resource for improving cloud security. Many cloud IaaS providers like AWS, Azure, and Google Cloud have a shared responsibility model. They provide the physical and architectural security, along with tools to properly secure the services they offer, but it is up to the user to configure those settings properly.

https://github.com/aquasecurity/cloud-security-remediation-guides

#aws #azure #gcp
🔶 Determining AWS IAM Policies According To Terraform And AWS CLI

The process of granting the least privileges required to execute "aws s3 ls" and "terraform apply" by a CI/CD runner.

https://www.iampulse.com/t/determining-aws-iam-policies-according-to-terraform-and-aws-cli

#aws
🔶 Running AWS PCI DSS with CloudQuery Policies

CloudQuery policies gives you a powerful way to automate, customize, codify, and run your cloud security & compliance continuously with HCL and SQL. CloudQuery’s Yevgeny Pats describes their new AWS PCI DSS Policy, containing over 40 checks.

https://www.cloudquery.io/blog/running-aws-pci-dss-with-cloudquery-policies

#aws
🔶 Achieving Least Privilege with AWS IAM

Anthony Barbieri shares a few tips and tricks on the authorization side of IAM. Topics: client side monitoring and Cloudtrail, understanding which actions support resources restrictions, policy management, and leveraging conditions.

https://dev.to/prince_of_pasta/achieving-least-privilege-with-aws-iam-10i

#aws