CloudSec Wine
2.13K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🙂 Dear friends,
Happy New Year 2022! 🎅

We wish you personal and career success. Stay with us. Next year we will continue to delight you with only high-quality content!

#HappyNewYear
🔷 NotLegit: Azure App Service vulnerability exposed hundreds of source code repositories

Another vulnerability discovered by the Wiz Research Team, where the Azure App Service exposed hundreds of source code repositories.

https://blog.wiz.io/azure-app-service-source-code-leak/

#azure
🔴 Cloud-Native Ransomware Protection in GCP

The five pillars of the NIST CSF help create a layered security approach to the fight against ransomware.

https://scalesec.com/blog/cloud-native-ransomware-protection-gcp/

#gcp
🔶 Get Email Notification On AWS IAM User Creation

Example CloudWatch rule and Lambda function to send an email via SES whenever an IAM user is created.

https://www.iampulse.com/t/get-email-notification-on-aws-iam-user-creation

#aws
🔴 Impersonate the Cloud: Running your app locally as if you were on Google Cloud

Some ways to securely run an app locally with the exact same context as on Google Cloud.

https://www.iampulse.com/t/impersonate-the-cloud-running-your-app-locally-as-if-you-were-on-google-cloud

#gcp
🔶 2 Critical Cloud Vulnerabilities to Convince You to Move to the Cloud

The Orca Security Research Team wrote about 2 critical zero-day vulnerabilities affecting AWS: Superglue and BreakingFormation. These vulnerabilities could've allowed unauthorized access to customer data and/or sensitive code and data within AWS.

https://orca.security/resources/blog/two-critical-cloud-vulnerabilities/

#aws
🔷 Persistence with Azure Policy Guest Configuration

Use Azure Policy Guest Configuration to gain persistence in your target environment and how to detect such an attack as a defender.

https://cloudbrothers.info/en/azure-persistence-azure-policy-guest-configuration/

#azure
🔴 Geofencing a Globally Load Balanced service on GCP using Cloud Armor

How to use Cloud Armor to geofence a website/service running on GCP using Cloud Run, Google Cloud Storage (GCS) and the Global HTTP(S) Load Balancer.

https://medium.com/google-cloud/geofencing-a-globally-load-balanced-service-on-gcp-using-cloud-armor-44099480fd00

#gcp
🔶 Vulnerable AWS Lambda function - Initial access in cloud attacks

How a vulnerable AWS Lambda function could be used by attackers, and some best practices to mitigate these attacks.

https://sysdig.com/blog/exploit-mitigate-aws-lambdas-mitre/

#aws
🔴 Creating your first GCP Organization

A walk-through for anyone who hasn't yet created their first Google Identity domain for experimentation in GCP.

https://www.chrisfarris.com/post/gcp-create-domain/

#gcp
🔶 GitHub Actions - Update on OIDC based deployments to AWS

If you use OIDC to deploy from Github Action to AWS, update the trusted thumbprint!

https://github.blog/changelog/2022-01-13-github-actions-update-on-oidc-based-deployments-to-aws/

#aws
🔶 How I Discovered Thousands of Open Databases on AWS

A writeup describing the journey on finding and reporting databases with sensitive data about Fortune-500 companies, hospitals, crypto platforms, startups, and more.

https://infosecwriteups.com/how-i-discovered-thousands-of-open-databases-on-aws-764729aa7f32

#aws