CloudSec Wine
2.13K subscribers
908 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation

PaloAlto identified severe security issues within AWS Log4Shell hot patch solutions. This article provides a root cause analysis and overview of fixes and mitigations.

https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities

#aws
🔥2
🔴 Where's my stuff on GCP?

In 2018 GCP released a feature called Cloud Asset Inventory. It allows one to search for all your resources globally: "$ gcloud asset search-all-resources".

https://medium.com/google-cloud/wheres-my-stuff-on-gcp-4a58badda6cc

#gcp
👍2
🔶 Implementing Cloud Governance as a Code using Cloud Custodian

Cloud Custodian enables us to define rules and remediation as one policy to facilitate a well-managed cloud infrastructure.

https://www.infracloud.io/blogs/cloud-governance-code-cloud-custodian

#aws
🔥2
🔷 "ExtraReplica" - a cross-account database vulnerability in Azure PostgreSQL

Wiz Research has discovered a chain of critical vulnerabilities in the widely used Azure Database for PostgreSQL Flexible Server. Dubbed ExtraReplica, this vulnerability allows unauthorized read access to other customers' PostgreSQL databases, bypassing tenant isolation.

https://www.wiz.io/blog/wiz-research-discovers-extrareplica-cross-account-database-vulnerability-in-azure-postgresql

#azure
🔥3
🔶 CloudGoat goes Serverless: A walkthrough of Vulnerable Lambda Functions

This post walks through exploiting serverless environments and AWS Lambda functions via the CloudGoat vulnerable_lambda scenario.

https://rhinosecuritylabs.com/cloud-security/cloudgoat-vulnerable-lambda-functions

#aws
👍5👏2
🔶 Cloud-Native Ransomware – How attacks on availability leverage cloud services

Paper which outlines the paths a malicious actor might take to affect the availability of data by using the tools provided by Cloud Service Providers, as well as providing architectural patterns to make securing these systems easier and methods for detecting cloud-native ransomware.

https://content.vectra.ai/rs/748-MCE-447/images/WhitePaper_Cloud_Native_Ransomware.pdf

#aws
🔥1
🔶 A decade of innovating with AWS Marketplace

An interesting history and overview of AWS Marketplace, which aims to make it easy to buy and deploy software from vendors into your AWS environment, like Snowflake, Databricks, Palo Alto Networks, and more.

https://aws.amazon.com/ru/blogs/awsmarketplace/decade-innovating-aws-marketplace

#aws
👍1
🔶 Old Services, New Tricks: Cloud Metadata Abuse by UNC2903

Mandiant identified exploitation of public-facing web applications by threat actors (UNC2903) to harvest credentials using Amazon's Instance Metadata Service (IMDS).

https://www.mandiant.com/resources/cloud-metadata-abuse-unc2903

#aws
🔥2
🔶 Bottlerocket Security Guidance

Recommendations, details, and examples to help you create a configuration that meets your security and compliance requirements.

https://github.com/bottlerocket-os/bottlerocket/blob/develop/SECURITY_GUIDANCE.md

#aws
🔥1
🔷 Intelligent application protection from edge to cloud with Azure Web Application Firewall

Microsoft has been evolving Azure Web Application Firewall (Azure WAF), a cloud-native, self-managed security service to protect your applications and APIs running in Azure or anywhere else, from the network edge to the cloud.

https://azure.microsoft.com/en-gb/blog/intelligent-application-protection-from-edge-to-cloud-with-azure-web-application-firewall

#azure
👍4
🔶 Tools That Use AWS Logs to Help with Least Privilege

Great overview by Sym’s Adam Buggia on resources and tools for creating least privilege IAM policies. He discusses deriving AWS policies from CloudTrail Data vs designing policies using Client Side Monitoring (and their respective trade-offs), and how to generate policies for a Terraform Project using Localstack.

https://blog.symops.com/2022/05/06/least-privilege-policies-from-aws-logs

#aws
🔥3👍1
🔴 How many of your GCP buckets are publicly accessible? It might be more than you think...

A thorough examination of Google Cloud Platform's (GCP) storage service, how to access buckets, and how to make sure your buckets are configured as intended.

https://blog.lightspin.io/gcp-buckets-publicly-accessible

#gcp
👍2
🔷 Azure Synapse Security Advisory - Orca Security

Orca Security issued a security advisory to address hazards in the use of the Microsoft Azure Synapse service. It is believef the tenant separation in this service is insufficiently robust to protect secrets against other tenants.

https://orca.security/resources/blog/azure-synapse-analytics-security-advisory

#azure
🔥2
🔶 Security reference architecture for a serverless application

A walkthrough of security controls for a serverless architecture via a demo application.

https://anunay-bhatt.medium.com/security-reference-architecture-for-a-serverless-application-2fcd25b1d5e2

#aws
👍1🔥1
🔶 Securing AWS Lambda function URLs

Learn about the security risks of misconfigured Lambda function URLs and how to properly secure them.

https://www.wiz.io/blog/securing-aws-lambda-function-urls

#aws
🔥2
🔶 Learning from AWS Customer Security Incidents [2022]

Slides of a post discussing the public catalog of AWS Customer Security Incidents, covering over twenty different public breaches. It walks through the technical details of these attacks, establish the common root causes, look at lessons learned, and establish how you can proactively secure your environment against these real world risks.

https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents-2022

#aws
👍2
🔴 Trampoline Pods: Node to Admin PrivEsc Built Into Popular K8s Platforms

Researchers from Palo Alto Networks presented research findings on “trampoline pods”—pods with an elevated set of privileges required to do their job, but that could conceivably be used as a jumping off point to gain escalated privileges. You can also read GKE's response.

https://static.sched.com/hosted_files/kccnceu2022/35/Trampoline%20Pods_%20Node%20to%20Admin%20PrivEsc%20Built%20Into%20Popular%20K8s%20Platforms.pptx.pdf

https://security.googleblog.com/2022/05/privileged-pod-escalations-in.html

#gcp
🔥2