CloudSec Wine
2.13K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 Kubernetes protection in Amazon GuardDuty

GuardDuty can now monitor Kubernetes clusters within your AWS environment.

https://docs.aws.amazon.com/guardduty/latest/ug/kubernetes-protection.html

#aws
🔶 Why you need to update your risky default EMR managed roles and policies

Post examining EMR's default roles and managed policies to understand if they follow security best practices of least privileges.

https://blog.lightspin.io/why-update-risky-default-emr-managed-roles-and-policies

#aws
🔶 Bypassing the AWS WAF protection with an 8KB bullet

The AWS WAF and Shield service can be used to protect web applications against a lot of different types of attacks. However, it has a limitation on the size of the packet that it can inspect that could result in attackers being able to bypass its protection features.

https://kloudle.com/blog/the-infamous-8kb-aws-waf-request-body-inspection-limitation

#aws
🔶 Ransomware-resistant backups with duplicity and AWS S3

Why you should care about ransomware attacks even for irrelevant internet-connected systems, and how to use duplicity with AWS S3 to create ransomware-resistant backups.

https://www.franzoni.eu/ransomware-resistant-backups

#aws
🔶 AWS IAM: Best practices [Part 1]

Some approaches on how to manage IAM policies at scale, how these approaches/practices will affect access management and how to include these practices in an existing or new setup.

https://www.iampulse.com/articles/aws-iam-best-practices-part-1

#aws
🔷 Understanding and Protecting local authentication for Azure services - Part 1

The challenge is to protect service-level (or local) authentication credentials from malicious or unintended use in a way that is manageable at scale.

https://davidokeyode.medium.com/understanding-and-protecting-local-authentication-for-azure-services-part-1-e1b308e7b05f

#azure
🔴 Auditing GKE operations? Configure Data Access audit logs

The GKE Admin Activity logs are missing "get" operations on Secret objects by default. So for example, if you store a service account password in your cluster as a Kubernetes secret, a "kubectl get secret service_account_password -o yaml" will get an attacker the entire secret without logging a single line into the audit logs.

https://padlock.argh.in/2022/02/10/gke-audit.html

#gcp
🔶 Elastic and AWS Serverless Application Repository (SAR)

How to use the Elastic serverless forwarder, that is published in the AWS Serverless Application Repository (SAR), to simplify log ingestion from S3.

https://www.elastic.co/blog/elastic-and-aws-serverless-application-repository-speed-time-to-actionable-insights-with-frictionless-log-ingestion-from-amazon-s3

#aws
🔶 Terraform AWS Provider 4.0 Refactors S3 Bucket Resource

Version 4.0 of the HashiCorp Terraform AWS provider brings usability improvements to data sources and attribute validations along with a refactored S3 bucket resource. The list of breaking changes for this release is quite long.

https://www.hashicorp.com/blog/terraform-aws-provider-4-0-refactors-s3-bucket-resource

#aws
🔷 Secure Azure Cosmos DB access by using Azure Managed Identities

How to use Azure RBAC to connect to Cosmos DB and increase the security of your application by using Azure Managed Identities.

https://itnext.io/secure-azure-cosmos-db-access-by-using-azure-managed-identities-55f9fdf48fda?gi=eec46e048be1

#azure
🔶 AdminTurnedDevOps/DevOps-The-Hard-Way-AWS

Free labs, documentation, and diagrams for setting up an environment that is using DevOps technologies and practices for deploying apps and cloud services/cloud infrastructure to AWS, by Mike Levan.

https://github.com/AdminTurnedDevOps/DevOps-The-Hard-Way-AWS

#aws
🔷🔴 Google Cloud: configuring workload identity federation with Azure

How to configure workload identity federation with Azure (OIDC-compliant IdP) so workloads running on an Azure VM can impersonate a service account to perform operations on a Google Cloud resource.

https://medium.com/google-cloud/configuring-workload-identity-federation-with-azure-672a1e1f3eec

#azure #gcp
🔶 Are AWS account IDs sensitive information?

One of the often-debated questions in AWS is whether AWS account IDs are sensitive information or not and the question has been oddly-difficult to answer definitively.

https://www.lastweekinaws.com/blog/are-aws-account-ids-sensitive-information/

#aws
🔶🔷🔴 Cloud 9: Top Cloud Penetration Testing Tools

Here are nine cloud pen testing tools use by pentesters in 2022, and additional resources for enhancing your cloud pentesting skills.

https://bishopfox.com/blog/cloud-pen-testing-tools

#aws #azure #gcp