CloudSec Wine
2.13K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔷 Managed Identity Attack Paths, Part 1: Automation Accounts

A three part blog series exploring attack paths that emerge out of Managed Identity assignments in three Azure services.

https://posts.specterops.io/managed-identity-attack-paths-part-1-automation-accounts-82667d17187a

#azure
👍1🔥1
🔴 Enumeration and lateral movement in GCP environments

A pentest write up describing how it was possible to compromise a hybrid GCP hosted infrastructure using native GCP tools.

https://infosecwriteups.com/enumeration-and-lateral-movement-in-gcp-environments-c3b82d342794

#gcp
😱2
🔶🔷🔴 cloud-middleware-dataset

This project contains cloud middleware (i.e. agents installed by cloud security providers) used across the major cloud service providers (Azure, AWS and GCP).

https://github.com/wiz-sec/cloud-middleware-dataset

#aws #azure #gcp
👍2
🔴 An Easy Misconfiguration to Make: Hidden Dangers in the Cloud Control Plane

The biggest risk in cloud development is not recognizing the differences between cloud and traditional definitions of common architecture terms.

https://www.mitiga.io/blog/misconfiguration-hidden-dangers-cloud-control-plane

#gcp
🔥2
🔷 SynLapse - Technical Details for Critical Azure Synapse Vulnerability

This blog describes the technical details of SynLapse, a critical Synapse Analytics vulnerability in Microsoft Azure which allowed attackers to bypass tenant separation.

https://orca.security/resources/blog/synlapse-critical-azure-synapse-analytics-service-vulnerability

#azure
🔥1
🔴 Incident report: Spotting an attacker in GCP

A walk through of how an attacker gained access to a customer's GCP environment, Expel's investigative process, and some key takeaways for securing your organization.

https://expel.com/blog/incident-report-spotting-an-attacker-in-gcp

#gcp
👍2
🔶🔷🔴 Cloud Risk Encyclopedia

1200+ cloud security risks, 3 cloud platforms, 47 compliance frameworks, 18 risk categories, 4 risk levels.

https://orca.security/resources/cloud-risk-encyclopedia

#aws #azure #gcp
🔥3👍1
🔷Establish security boundaries in your on-prem AD and Azure environment

A high-level explanation of how to implement security boundaries in an on-prem AD and Azure environment to protect your critical assets based on the principle of tiered administration, including how BloodHound can help you in the process.

https://posts.specterops.io/establish-security-boundaries-in-your-on-prem-ad-and-azure-environment-dcb44498cfc2

#azure
👍1
🔴 Google Cloud Security Overview

A bird's eye view of the Google Cloud Security Services, illustrated via sketchnotes.

https://cloud.google.com/blog/topics/developers-practitioners/google-cloud-security-overview

#gcp
🔥2
🔷FabricScape: Escaping Service Fabric and Taking Over the Cluster

FabricScape (CVE-2022-30137) is a privilege escalation vulnerability in Microsoft's Service Fabric, which allowed cross tenant root access built out of unprivileged processes.

https://unit42.paloaltonetworks.com/fabricscape-cve-2022-30137

#azure
🔥1
🔶CloudGoat Scenario: Avoiding AWS Security Detection and Response

This will walk through the CloudGoat AWS detection_evasion scenario, detailing how to avoid AWS security detection and response services, such as in Lambda.

https://rhinosecuritylabs.com/cloud-security/cloudgoat-detection_evasion-walkthrough

#aws
🔥1
🔷Sky's the Limit: Stratus Red Team for Azure

A write-up on using Stratus Red Team for testing threat detection rules.

https://blog.detect.dev/posts/azure_for_stratus.html

#azure
🔥1
🔶🔷🔴 The Open Cloud Vulnerability & Security Issue Database

An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues.

https://www.cloudvulndb.org

#aws #azure #gcp
👍2👏1
🔷 Kubernetes Workload Identity with AKS

Post explaining how workload identity federation on AKS works, and how to set it up.

https://blog.baeke.info/2022/01/31/kubernetes-workload-identity-with-aks

#azure
👍1
🔶Building AWS Security Guardrails

Kinnaird McQuade joins Ashish Rajan on the Cloud Security Podcast to discussing building AWS security guardrails that prevent classes of bugs, scaling guardrails, the difference between preventative and detective security controls, and more.

https://www.youtube.com/watch?v=jW-LkpVvsLk

#aws
🔥1