CloudSec Wine
2.13K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 AWS Startup Security Baseline

Guidance by AWS’ Jay Michael on a set of controls that create a minimum foundation for businesses to build securely on AWS without decreasing their agility.

https://docs.aws.amazon.com/prescriptive-guidance/latest/aws-startup-security-baseline/welcome.html

#aws
👍5
🔶 When and where to use IAM permissions boundaries

AWS’s Umair Rehmat covers common use cases for permissions boundaries, some best practices to consider, and a few things to avoid.

https://aws.amazon.com/ru/blogs/security/when-and-where-to-use-iam-permissions-boundaries

#aws
🔥2
🔴 How to Think about Threat Detection in the Cloud

Google’s Anton Chuvakin and Tim Peacock share their views on a foundational framework for thinking about threat detection in public cloud computing.

https://medium.com/anton-on-security/how-to-think-about-threat-detection-in-the-cloud-1baff902afe5

#gcp
😱2👍1
🔷 Managed Identity Attack Paths, Part 1: Automation Accounts

A three part blog series exploring attack paths that emerge out of Managed Identity assignments in three Azure services.

https://posts.specterops.io/managed-identity-attack-paths-part-1-automation-accounts-82667d17187a

#azure
👍1🔥1
🔴 Enumeration and lateral movement in GCP environments

A pentest write up describing how it was possible to compromise a hybrid GCP hosted infrastructure using native GCP tools.

https://infosecwriteups.com/enumeration-and-lateral-movement-in-gcp-environments-c3b82d342794

#gcp
😱2
🔶🔷🔴 cloud-middleware-dataset

This project contains cloud middleware (i.e. agents installed by cloud security providers) used across the major cloud service providers (Azure, AWS and GCP).

https://github.com/wiz-sec/cloud-middleware-dataset

#aws #azure #gcp
👍2
🔴 An Easy Misconfiguration to Make: Hidden Dangers in the Cloud Control Plane

The biggest risk in cloud development is not recognizing the differences between cloud and traditional definitions of common architecture terms.

https://www.mitiga.io/blog/misconfiguration-hidden-dangers-cloud-control-plane

#gcp
🔥2
🔷 SynLapse - Technical Details for Critical Azure Synapse Vulnerability

This blog describes the technical details of SynLapse, a critical Synapse Analytics vulnerability in Microsoft Azure which allowed attackers to bypass tenant separation.

https://orca.security/resources/blog/synlapse-critical-azure-synapse-analytics-service-vulnerability

#azure
🔥1
🔴 Incident report: Spotting an attacker in GCP

A walk through of how an attacker gained access to a customer's GCP environment, Expel's investigative process, and some key takeaways for securing your organization.

https://expel.com/blog/incident-report-spotting-an-attacker-in-gcp

#gcp
👍2
🔶🔷🔴 Cloud Risk Encyclopedia

1200+ cloud security risks, 3 cloud platforms, 47 compliance frameworks, 18 risk categories, 4 risk levels.

https://orca.security/resources/cloud-risk-encyclopedia

#aws #azure #gcp
🔥3👍1
🔷Establish security boundaries in your on-prem AD and Azure environment

A high-level explanation of how to implement security boundaries in an on-prem AD and Azure environment to protect your critical assets based on the principle of tiered administration, including how BloodHound can help you in the process.

https://posts.specterops.io/establish-security-boundaries-in-your-on-prem-ad-and-azure-environment-dcb44498cfc2

#azure
👍1
🔴 Google Cloud Security Overview

A bird's eye view of the Google Cloud Security Services, illustrated via sketchnotes.

https://cloud.google.com/blog/topics/developers-practitioners/google-cloud-security-overview

#gcp
🔥2
🔷FabricScape: Escaping Service Fabric and Taking Over the Cluster

FabricScape (CVE-2022-30137) is a privilege escalation vulnerability in Microsoft's Service Fabric, which allowed cross tenant root access built out of unprivileged processes.

https://unit42.paloaltonetworks.com/fabricscape-cve-2022-30137

#azure
🔥1
🔶CloudGoat Scenario: Avoiding AWS Security Detection and Response

This will walk through the CloudGoat AWS detection_evasion scenario, detailing how to avoid AWS security detection and response services, such as in Lambda.

https://rhinosecuritylabs.com/cloud-security/cloudgoat-detection_evasion-walkthrough

#aws
🔥1