CloudSec Wine
2.13K subscribers
907 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 Access Undenied on AWS

Ermetic’s Noam Dahan describes a cool new tool, Access Undenied, which parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable least privilege fixes. See Noam’s fwd:cloudsec talk on it here and Twitter thread here.

https://ermetic.com/blog/aws/access-undenied-on-aws

#aws
🔶 Codify your best practices using service control policies

Overview post on what SCPs are, why you should create SCPs, and the strategy you can use to implement SCPs, as well as how to continue iterating and improving SCPs as your workloads and business needs change. Part 2 discusses how you can create SCPs using constructs from AWS Well-Architected.

https://aws.amazon.com/ru/blogs/mt/codify-your-best-practices-using-service-control-policies-part-1

#aws
🔷 Azure Active Directory Exposes Internal Information

The first issue allows anyone to query the directory synchronization status. The second issue could reveal internal information about the target Azure AD tenant, including the technical contact's full name and phone number.

https://www.secureworks.com/research/azure-active-directory-exposes-internal-information

#azure
🔶 Denonia: The First Malware Specifically Targeting Lambda

The malware uses newer address resolution techniques for command and control traffic to evade typical detection measures and virtual network access controls.

https://www.cadosecurity.com/cado-discovers-denonia-the-first-malware-specifically-targeting-lambda

#aws
👍3
🔶 AWS Lambda: function URL is live!

AWS has announced AWS Lambda Function URLs, which basically lets you use Lambdas as a public HTTPS endpoint without using an API Gateway or Application Load Balancer. Lumigo’s Yan Cui provides more context about what Function URLs are, how they work, and how to take advantage of them.

https://lumigo.io/blog/aws-lambda-function-url-is-live

#aws
🔶 CVE-2022-25165: Privilege Escalation to SYSTEM in AWS VPN Client

The AWS VPN Client application is affected by an arbitrary file write as SYSTEM, which can lead to privilege escalation.

https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client

#aws
🔥4
🔷 Abusing Azure Hybrid Workers for Privilege Escalation - Part 2: An Azure PrivSec Story

The NetSPI team recently discovered a set of issues that allows any Azure user with the Subscription Reader role to dump saved credentials and certificates from Automation Accounts. In cases where Run As accounts were used, this allowed for a Reader to Contributor privilege escalation path.

https://www.netspi.com/blog/technical/cloud-penetration-testing/abusing-azure-hybrid-workers-part-2

#azure
👍1
🔶 AWS RDS Vulnerability Leads to AWS Internal Service Credentials

Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension.

https://blog.lightspin.io/aws-rds-critical-security-vulnerability

#aws
🔥3
🔶 Cross-account role trust policies should trust AWS accounts, not roles

A role trust policy that trusts a specific principal suggests that only that source principal has access to it, but it does not control access to that source principal, and so makes it seem like it limits access when it may not.

https://ben11kehoe.medium.com/cross-account-role-trust-policies-should-trust-aws-accounts-not-roles-32737dfeaa03

#aws
👍2🤔2
🔷 Abusing Azure Container Registry Tasks

How one Azure service supporting DevOps can start in a very solid "secure by default" state, but then quickly descend into a very dangerous configured state.

https://posts.specterops.io/abusing-azure-container-registry-tasks-1f407bfaa465

#azure
👍3🔥1
🔶 AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation

PaloAlto identified severe security issues within AWS Log4Shell hot patch solutions. This article provides a root cause analysis and overview of fixes and mitigations.

https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities

#aws
🔥2
🔴 Where's my stuff on GCP?

In 2018 GCP released a feature called Cloud Asset Inventory. It allows one to search for all your resources globally: "$ gcloud asset search-all-resources".

https://medium.com/google-cloud/wheres-my-stuff-on-gcp-4a58badda6cc

#gcp
👍2
🔶 Implementing Cloud Governance as a Code using Cloud Custodian

Cloud Custodian enables us to define rules and remediation as one policy to facilitate a well-managed cloud infrastructure.

https://www.infracloud.io/blogs/cloud-governance-code-cloud-custodian

#aws
🔥2
🔷 "ExtraReplica" - a cross-account database vulnerability in Azure PostgreSQL

Wiz Research has discovered a chain of critical vulnerabilities in the widely used Azure Database for PostgreSQL Flexible Server. Dubbed ExtraReplica, this vulnerability allows unauthorized read access to other customers' PostgreSQL databases, bypassing tenant isolation.

https://www.wiz.io/blog/wiz-research-discovers-extrareplica-cross-account-database-vulnerability-in-azure-postgresql

#azure
🔥3
🔶 CloudGoat goes Serverless: A walkthrough of Vulnerable Lambda Functions

This post walks through exploiting serverless environments and AWS Lambda functions via the CloudGoat vulnerable_lambda scenario.

https://rhinosecuritylabs.com/cloud-security/cloudgoat-vulnerable-lambda-functions

#aws
👍5👏2
🔶 Cloud-Native Ransomware – How attacks on availability leverage cloud services

Paper which outlines the paths a malicious actor might take to affect the availability of data by using the tools provided by Cloud Service Providers, as well as providing architectural patterns to make securing these systems easier and methods for detecting cloud-native ransomware.

https://content.vectra.ai/rs/748-MCE-447/images/WhitePaper_Cloud_Native_Ransomware.pdf

#aws
🔥1