CloudSec Wine
2.13K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔴 How many of your GCP buckets are publicly accessible? It might be more than you think...

A thorough examination of Google Cloud Platform's (GCP) storage service, how to access buckets, and how to make sure your buckets are configured as intended.

https://blog.lightspin.io/gcp-buckets-publicly-accessible

#gcp
👍2
🔷 Azure Synapse Security Advisory - Orca Security

Orca Security issued a security advisory to address hazards in the use of the Microsoft Azure Synapse service. It is believef the tenant separation in this service is insufficiently robust to protect secrets against other tenants.

https://orca.security/resources/blog/azure-synapse-analytics-security-advisory

#azure
🔥2
🔶 Security reference architecture for a serverless application

A walkthrough of security controls for a serverless architecture via a demo application.

https://anunay-bhatt.medium.com/security-reference-architecture-for-a-serverless-application-2fcd25b1d5e2

#aws
👍1🔥1
🔶 Securing AWS Lambda function URLs

Learn about the security risks of misconfigured Lambda function URLs and how to properly secure them.

https://www.wiz.io/blog/securing-aws-lambda-function-urls

#aws
🔥2
🔶 Learning from AWS Customer Security Incidents [2022]

Slides of a post discussing the public catalog of AWS Customer Security Incidents, covering over twenty different public breaches. It walks through the technical details of these attacks, establish the common root causes, look at lessons learned, and establish how you can proactively secure your environment against these real world risks.

https://speakerdeck.com/ramimac/learning-from-aws-customer-security-incidents-2022

#aws
👍2
🔴 Trampoline Pods: Node to Admin PrivEsc Built Into Popular K8s Platforms

Researchers from Palo Alto Networks presented research findings on “trampoline pods”—pods with an elevated set of privileges required to do their job, but that could conceivably be used as a jumping off point to gain escalated privileges. You can also read GKE's response.

https://static.sched.com/hosted_files/kccnceu2022/35/Trampoline%20Pods_%20Node%20to%20Admin%20PrivEsc%20Built%20Into%20Popular%20K8s%20Platforms.pptx.pdf

https://security.googleblog.com/2022/05/privileged-pod-escalations-in.html

#gcp
🔥2
🔶 Zero Maintenance AWS Canary Tokens That Scale

By utilizing temporary credentials (credentials returned as the result of the AssumeRole operation) as honeytokens, we can deploy a honeytoken approach that scales with our environment, utilize existing detection mechanisms (CloudTrail alerting), and remove the need to run a set of infrastructure dedicated to managing IAM Users.

https://medium.com/@williambengtson/zero-maintenance-aws-canary-tokens-that-scale-b470c6f60da

#aws
👍1
🔶🔴 Implementing Secure Code in the Cloud

Learn how to implement security in the cloud at the application layer.

https://scalesec.com/blog/implementing-secure-code-in-the-cloud

#aws #gcp
👍3🔥2
🔶🔷🔴 A Look Into Public Clouds From the Ransomware Actor's Perspective

Article exploring how ransomware threat actors might operate in cloud environments, and what approaches they might use to attack and impact resources in public clouds.

https://unit42.paloaltonetworks.com/ransomware-in-public-clouds

#aws #azure #gcp
🔥1
🔷 Automating Azure Abuse Research

A step-by-step process for automating Azure abuse research, with examples for Azure Virtual Machines and their Managed Identities.

https://posts.specterops.io/automating-azure-abuse-research-part-1-30b0eca33418

#azure
😱1
🔶 A Review of the AWS Security Model

AWS have released their own security maturity model, but does it stack up against what we're seeing in real-world attacks and in the approaches being suggested by the rest of the AWS security community?

https://www.nojones.net/posts/a-review-of-the-aws-security-maturity-model

#aws
👍3
🔶🔷🔴 google/cloud-forensics-utils

A Python library to carry out DFIR analysis on the cloud. Currently supports GCP, Azure, and AWS.

https://github.com/google/cloud-forensics-utils

#aws #azure #gcp
👍2
🔶 AWS Startup Security Baseline

Guidance by AWS’ Jay Michael on a set of controls that create a minimum foundation for businesses to build securely on AWS without decreasing their agility.

https://docs.aws.amazon.com/prescriptive-guidance/latest/aws-startup-security-baseline/welcome.html

#aws
👍5
🔶 When and where to use IAM permissions boundaries

AWS’s Umair Rehmat covers common use cases for permissions boundaries, some best practices to consider, and a few things to avoid.

https://aws.amazon.com/ru/blogs/security/when-and-where-to-use-iam-permissions-boundaries

#aws
🔥2
🔴 How to Think about Threat Detection in the Cloud

Google’s Anton Chuvakin and Tim Peacock share their views on a foundational framework for thinking about threat detection in public cloud computing.

https://medium.com/anton-on-security/how-to-think-about-threat-detection-in-the-cloud-1baff902afe5

#gcp
😱2👍1
🔷 Managed Identity Attack Paths, Part 1: Automation Accounts

A three part blog series exploring attack paths that emerge out of Managed Identity assignments in three Azure services.

https://posts.specterops.io/managed-identity-attack-paths-part-1-automation-accounts-82667d17187a

#azure
👍1🔥1
🔴 Enumeration and lateral movement in GCP environments

A pentest write up describing how it was possible to compromise a hybrid GCP hosted infrastructure using native GCP tools.

https://infosecwriteups.com/enumeration-and-lateral-movement-in-gcp-environments-c3b82d342794

#gcp
😱2