CloudSec Wine
2.13K subscribers
908 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 AWS Security Reference Architecture

60pg PDF by AWS Professional services containing a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment. GitHub repo with example solutions.

https://github.com/aws-samples/aws-security-reference-architecture-examples

#aws
🔶A comprehensive Threat Model for Amazon S3.

https://controlcatalog.trustoncloud.com/dashboard/aws/s3

#aws
🔶🔷🔴 CVE-2022-0847 (aka Dirty Pipe): What does it mean for defenders

A quick summary and actionable advice for defenders of cloud environments and those teams who are asked to determine the impact of CVE-2022-0847 on their company's infrastructure.

https://www.marcolancini.it/2022/blog-cve-2022-0847-dirty-pipe

#aws #azure #gcp
🔷 AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service

AutoWarp is a critical vulnerability in Microsoft Azure Automation Service that allows unauthorized access to other customer accounts using the service.

https://orca.security/resources/blog/autowarp-microsoft-azure-automation-service-vulnerability

#azure
🔴 Lateral Movement in Google Cloud: Abusing the Infamous Default Service Account Misconfiguration

This post covers how a malicious actor can conduct lateral movement in Google Cloud across compute engine instances using the default service account.

https://orca.security/resources/blog/lateral-movement-google-cloud-default-service-account

#gcp
🔷 Escalating from Logic App Contributor to Root Owner in Azure

Having Contributor access to an Azure Resource Manager (ARM) API Connection would allow you to create arbitrary role assignments as the connected user. This was supposed to be limited to actions at the Resource Group level, but an attacker could escape to the Subscription or Root level with a path traversal payload.

https://www.netspi.com/blog/technical/cloud-penetration-testing/azure-logic-app-contributor-escalation-to-root-owner

#azure
🔷 Abusing Family Refresh Tokens for Unauthorized Access and Persistence in Azure Active Directory

Undocumented functionality in Azure Active Directory allows a group of Microsoft OAuth client applications to obtain special "family refresh tokens", which can be redeemed for bearer tokens as any other client in the family.

https://github.com/secureworks/family-of-client-ids-research

#azure
🔶 Why Step Functions is the Best AWS Service You Are Not Using

Using Serverless AWS Step Functions To Accelerate FedRAMP Moderate ATO.

https://itnext.io/why-step-functions-is-the-best-aws-service-you-are-not-using-4f3c133d7d0d

#aws
🔷 Abusing Azure Hybrid Workers for Privilege Escalation - Part 1

Azure Hybrid Workers can be configured to use Automation Account "Run as" accounts, which can expose the credentials to anyone with local administrator access to the Hybrid Worker. Since "Run as" accounts are typically subscription contributors, this can lead to privilege escalation from multiple Azure Role-Based Access Control (RBAC) roles.

https://www.netspi.com/blog/technical/cloud-penetration-testing/abusing-azure-hybrid-workers-for-privilege-escalation

#azure
🔷 A goat in the boat: a look at how Defender for Containers protects your clusters

Article exploring and testing Defender for Containers against a vulnerable environment and see what it can detect or prevent.

https://guillaumeben.xyz/defender-containers.html

#azure
🔶 Fantastic AWS Hacks and Where to Find Them

Getting started in AWS security, and how companies are getting hacked on AWS. You can also check a nice interactive mindmap.

https://docs.google.com/presentation/d/1WIg9Zctp7emuEgnehArUEwvkHSpC6JOi7ojejMX6L_s/edit#slide=id.g118f683adf8_0_43

#aws
🔴 Google Cloud Storage Explorer: Enumerating Google Cloud’s Bucket Access Permissions

The 'Google Cloud Platform Storage Explorer' tool crawls all of your Google Cloud projects and detects which have access to all storage data.

https://orca.security/resources/blog/google-cloud-platform-storage-explorer

#gcp
🔷 Azure Dominance Paths

A comprehensive map of Azure and Azure AD attack paths.

https://cloudbrothers.info/en/azure-dominance-paths

#azure
🔥1
🔶🔷🔴 What to look for when reviewing a company's infrastructure

A comprehensive guide that provides a structured approach to reviewing the security architecture of a multi-cloud SaaS company and finding its most critical components.

https://www.marcolancini.it/2022/blog-cloud-security-infrastructure-review

#aws #azure #gcp
🔶 Automated Incident Response and Forensics Framework

A framework which aims to facilitate automated steps for incident response and forensics based on the AWS Incident Response White Paper.

https://github.com/awslabs/aws-automated-incident-response-and-forensics

#aws
🔷 Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365

Multiple investigations and testing by the CrowdStrike Services team identified inconsistencies in Azure AD sign-in logs.

https://www.crowdstrike.com/blog/crowdstrike-services-identifies-logging-inconsistencies-in-microsoft-365 (use VPN if you are from Russia)

#azure
👍1
🔴 New Privilege Escalation Techniques that Might Compromise Your Google Cloud Platform

Some common attack techniques that an attacker can use to exploit your Google Cloud Platform (GCP) environment, gain permissions, and steal information via services like Dataproc, Dataflow, and Composer.

https://medium.com/xm-cyber/new-privilege-escalation-techniques-are-compromising-your-google-cloud-platform-3b0ca78e6b6b

#gcp
🔶 Access Undenied on AWS

Ermetic’s Noam Dahan describes a cool new tool, Access Undenied, which parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable least privilege fixes. See Noam’s fwd:cloudsec talk on it here and Twitter thread here.

https://ermetic.com/blog/aws/access-undenied-on-aws

#aws
🔶 Codify your best practices using service control policies

Overview post on what SCPs are, why you should create SCPs, and the strategy you can use to implement SCPs, as well as how to continue iterating and improving SCPs as your workloads and business needs change. Part 2 discusses how you can create SCPs using constructs from AWS Well-Architected.

https://aws.amazon.com/ru/blogs/mt/codify-your-best-practices-using-service-control-policies-part-1

#aws