🔶AWS Identity and Access Management introduces IAM Roles Anywhere for workloads outside of AWS
IAM Roles Anywhere allows your workloads such as servers, containers, and applications to use X.509 digital certificates to obtain temporary AWS credentials and use the same IAM roles and policies that you have configured for your AWS workloads to access AWS resources.
https://aws.amazon.com/ru/about-aws/whats-new/2022/07/aws-identity-access-management-iam-roles-anywhere-workloads-outside-aws
#aws
IAM Roles Anywhere allows your workloads such as servers, containers, and applications to use X.509 digital certificates to obtain temporary AWS credentials and use the same IAM roles and policies that you have configured for your AWS workloads to access AWS resources.
https://aws.amazon.com/ru/about-aws/whats-new/2022/07/aws-identity-access-management-iam-roles-anywhere-workloads-outside-aws
#aws
Amazon
AWS Identity and Access Management introduces IAM Roles Anywhere for workloads outside of AWS
👍1
🔷 Cloud design patterns
Design patterns for building reliable, scalable, secure applications in the cloud by walking through examples based on Microsoft Azure.
https://docs.microsoft.com/en-us/azure/architecture/patterns
#azure
Design patterns for building reliable, scalable, secure applications in the cloud by walking through examples based on Microsoft Azure.
https://docs.microsoft.com/en-us/azure/architecture/patterns
#azure
Docs
Cloud Design Patterns - Azure Architecture Center
Learn about design patterns for building reliable, scalable, and more secure applications in the cloud with examples based on Microsoft Azure.
😱1
🔶Exploiting Authentication in AWS IAM Authenticator for Kubernetes
This blog post explains three vulnerabilities detected in the AWS IAM Authenticator where all of them were caused by the same code line.
https://blog.lightspin.io/exploiting-eks-authentication-vulnerability-in-aws-iam-authenticator
#aws
This blog post explains three vulnerabilities detected in the AWS IAM Authenticator where all of them were caused by the same code line.
https://blog.lightspin.io/exploiting-eks-authentication-vulnerability-in-aws-iam-authenticator
#aws
🔥2
🔴 How to think about threat detection in the cloud
Detecting cybersecurity threats in the cloud is different from on-premises. Here's why.
https://cloud.google.com/blog/products/identity-security/how-to-think-about-threat-detection-in-the-cloud
#gcp
Detecting cybersecurity threats in the cloud is different from on-premises. Here's why.
https://cloud.google.com/blog/products/identity-security/how-to-think-about-threat-detection-in-the-cloud
#gcp
Google Cloud Blog
How to think about threat detection in the cloud | Google Cloud Blog
Detecting cybersecurity threats in the cloud is different from on-premises. Here’s why.
🔥2
🔶aidansteele/openrolesanywhere
An open-source proof-of-concept client for AWS IAM Roles Anywhere by Aidan Steele. Unlike the official client, this project lets you use private keys stored in an SSH agent. This is more flexible - and more secure if you use something like Secretive which stores unexportable keys in the macOS Secure Enclave hardware.
https://github.com/aidansteele/openrolesanywhere
#aws
An open-source proof-of-concept client for AWS IAM Roles Anywhere by Aidan Steele. Unlike the official client, this project lets you use private keys stored in an SSH agent. This is more flexible - and more secure if you use something like Secretive which stores unexportable keys in the macOS Secure Enclave hardware.
https://github.com/aidansteele/openrolesanywhere
#aws
GitHub
GitHub - aidansteele/openrolesanywhere: Open-source proof-of-concept client for AWS IAM Roles Anywhere
Open-source proof-of-concept client for AWS IAM Roles Anywhere - GitHub - aidansteele/openrolesanywhere: Open-source proof-of-concept client for AWS IAM Roles Anywhere
👍1
🔶Tracking the Effectiveness of Cloud Adoption
AWS’s Nurani Parasuraman discusses how best to track the effectiveness of a company’s cloud adoption.
https://aws.amazon.com/ru/blogs/enterprise-strategy/tracking-effectiveness-of-cloud-adoption
#aws
AWS’s Nurani Parasuraman discusses how best to track the effectiveness of a company’s cloud adoption.
https://aws.amazon.com/ru/blogs/enterprise-strategy/tracking-effectiveness-of-cloud-adoption
#aws
Amazon
Tracking the Effectiveness of Cloud Adoption | Amazon Web Services
We often recommend that enterprises have a clear idea of what they hope to accomplish by moving to the cloud. They can then set up success measures that will both guide them and allow them to measure their progress. In this blog post, Nurani Parasuraman discusses…
🔥1
🔷 Azure’s Security Vulnerabilities Are Out of Control
Azure's multiple security vulnerabilities are highly concerning, for both customer data and the cloud's reputation. It's time we put public pressure on Azure.
https://www.lastweekinaws.com/blog/azures_vulnerabilities_are_quack
#azure
Azure's multiple security vulnerabilities are highly concerning, for both customer data and the cloud's reputation. It's time we put public pressure on Azure.
https://www.lastweekinaws.com/blog/azures_vulnerabilities_are_quack
#azure
Last Week in AWS
Azure’s Security Vulnerabilities Are Out of Control
Azure's multiple security vulnerabilities are highly concerning, for both customer data and the cloud's reputation. It's time we put public pressure on Azure.
😱1
🔶 Abusing the Replicator: Silently Exfiltrating Data with the AWS S3 Replication Service
A comprehensive backup strategy is a cornerstone of any DR plan. But how would you distinguish between legitimate backup activity and malicious data exfiltration?
https://www.vectra.ai/blogpost/abusing-the-replicator-silently-exfiltrating-data-with-the-aws-s3-replication-service
#aws
A comprehensive backup strategy is a cornerstone of any DR plan. But how would you distinguish between legitimate backup activity and malicious data exfiltration?
https://www.vectra.ai/blogpost/abusing-the-replicator-silently-exfiltrating-data-with-the-aws-s3-replication-service
#aws
www.vectra.ai
Abusing the Replicator: Silently Exfiltrating Data with the AWS S3 Replication Service by Kat Traxler
A comprehensive backup strategy is a cornerstone of any DR plan. But how would you distinguish between legitimate backup activity and malicious data exfiltration?
🔥1
🔴 How to overcome 5 common SecOps challenges
Here are 5 common issues that many SecOps teams struggle with, and how to fix them.
https://cloud.google.com/blog/products/identity-security/how-to-overcome-5-common-secops-challenges
#gcp
Here are 5 common issues that many SecOps teams struggle with, and how to fix them.
https://cloud.google.com/blog/products/identity-security/how-to-overcome-5-common-secops-challenges
#gcp
Google Cloud Blog
How to overcome 5 common SecOps challenges | Google Cloud Blog
Here are 5 common issues that many SecOps teams struggle with—and how to fix them.
🔥1
(in Russian)
Встречайте наше первое небольшое, но полноценное мероприятие по облачной безопасности в гибридном формате в уютном (но пока еще тайном) месте в центре летней Москвы.
Ждем с нетерпением инженеров по безопасности, директоров по ИБ, специалистов по DevSecOps, security инженеров и всех, кто интересуется этой тематикой.
На офлайн-мероприятие приглашаем участников нашего чата по безопасности, которые зарегистрируются в форме ниже. Мероприятие бесплатное.
Для тех, кто не сможет посетить нас очно, мы организуем трансляцию мероприятия.
Подробнее о мероприятии →
Творческое объединение WIP, Яузский бул., 11, стр. 1
#advertising
Встречайте наше первое небольшое, но полноценное мероприятие по облачной безопасности в гибридном формате в уютном (но пока еще тайном) месте в центре летней Москвы.
Ждем с нетерпением инженеров по безопасности, директоров по ИБ, специалистов по DevSecOps, security инженеров и всех, кто интересуется этой тематикой.
На офлайн-мероприятие приглашаем участников нашего чата по безопасности, которые зарегистрируются в форме ниже. Мероприятие бесплатное.
Для тех, кто не сможет посетить нас очно, мы организуем трансляцию мероприятия.
Подробнее о мероприятии →
Творческое объединение WIP, Яузский бул., 11, стр. 1
#advertising
👍8👎8
🔶 Best Practices for AWS Organizations Service Control Policies in a Multi-Account Environment
AWS’s Rajeswari Malladi and People’s United Bank’s Jim Kozlowski provide a representative organization unit (OU) structure for a financial services industry customer, and also best practice guidance and starter service control policies (SCPs) to consider in a multi-account AWS environment to establish governance and control.
https://aws.amazon.com/ru/blogs/industries/best-practices-for-aws-organizations-service-control-policies-in-a-multi-account-environment
#aws
AWS’s Rajeswari Malladi and People’s United Bank’s Jim Kozlowski provide a representative organization unit (OU) structure for a financial services industry customer, and also best practice guidance and starter service control policies (SCPs) to consider in a multi-account AWS environment to establish governance and control.
https://aws.amazon.com/ru/blogs/industries/best-practices-for-aws-organizations-service-control-policies-in-a-multi-account-environment
#aws
🔥1
🔴 Protecting GCP Services with VPC Service Controls and Terraform
Post exploring VPC Service Controls through an example of a common use case of VPC Service Control perimeters, deep dive on some key concepts, and learn how to automate administration with Terraform.
https://blog.scalesec.com/protecting-gcp-services-with-vpc-service-controls-and-terraform-858019d8b4ff
#gcp
Post exploring VPC Service Controls through an example of a common use case of VPC Service Control perimeters, deep dive on some key concepts, and learn how to automate administration with Terraform.
https://blog.scalesec.com/protecting-gcp-services-with-vpc-service-controls-and-terraform-858019d8b4ff
#gcp
👍1
🔶 Hacking an AWS hosted Kubernetes backed product, and failing
Tales from a recent pentest of a product hosted on the AWS cloud backed by Kubernetes (EKS) and a whole lot of secure design goodness that withstood attack attempts.
https://blog.appsecco.com/hacking-an-aws-hosted-kubernetes-backed-product-and-failing-904cbe0b7c0d
#aws
Tales from a recent pentest of a product hosted on the AWS cloud backed by Kubernetes (EKS) and a whole lot of secure design goodness that withstood attack attempts.
https://blog.appsecco.com/hacking-an-aws-hosted-kubernetes-backed-product-and-failing-904cbe0b7c0d
#aws
Medium
Hacking an AWS hosted Kubernetes backed product, and failing
Tales from a recent pentest of a product hosted on the AWS cloud backed by Kubernetes (EKS) and a whole lot of secure design goodness that…
🔥2👍1
🔶 Security best practices in IAM
An updated list of 14 IAM best practices by AWS.
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
#aws
An updated list of 14 IAM best practices by AWS.
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
#aws
Amazon
Security best practices in IAM - AWS Identity and Access Management
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
🔥1
🔶 IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege Escalation
Palo Alto Networks Jay Chen describes IAM-Deescalate, a tool to mitigate privilege escalation risks in AWS. It first identifies the users and roles with privilege escalation risks using PMapper.
For each risky principal, IAM-Deescalate calculates a minimal set of permissions granted to this principal that can be revoked to eliminate the risks. IAM-Deescalate inserts an inline policy to explicitly deny the risky permissions that could allow the principal to escalate to administrator privilege.
https://unit42.paloaltonetworks.com/iam-deescalate
#aws
Palo Alto Networks Jay Chen describes IAM-Deescalate, a tool to mitigate privilege escalation risks in AWS. It first identifies the users and roles with privilege escalation risks using PMapper.
For each risky principal, IAM-Deescalate calculates a minimal set of permissions granted to this principal that can be revoked to eliminate the risks. IAM-Deescalate inserts an inline policy to explicitly deny the risky permissions that could allow the principal to escalate to administrator privilege.
https://unit42.paloaltonetworks.com/iam-deescalate
#aws
Unit 42
IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege Escalation
We developed an open source tool, IAM-Deescalate, to help mitigate the privilege escalation risks of overly permissive identities in AWS.
🔥2
🔶 AWS glossary and fwd:cloudsec 2022
Hundreds of AWS product names and terms, described in a sentence or two, by Amazon.
https://docs.aws.amazon.com/general/latest/gr/glos-chap.html
Also a nice YouTube playlist is now live! Some excellent talks, as always.
https://www.youtube.com/playlist?list=PLCPCP1pNWD7N2SPaz4cmuS27xutaf32jy
#aws
Hundreds of AWS product names and terms, described in a sentence or two, by Amazon.
https://docs.aws.amazon.com/general/latest/gr/glos-chap.html
Also a nice YouTube playlist is now live! Some excellent talks, as always.
https://www.youtube.com/playlist?list=PLCPCP1pNWD7N2SPaz4cmuS27xutaf32jy
#aws
YouTube
fwd:cloudsec 2022 - YouTube
🔥1
🔶 Dependency confusion in AWS CodeArtifact
At the time of the finding Code Artifact did not have any features to specify which packages were internal and therefore should not be pulled from public repositories.
https://zego.engineering/dependency-confusion-in-aws-codeartifact-86b9ff68963d?gi=eb56bfabbd85
#aws
At the time of the finding Code Artifact did not have any features to specify which packages were internal and therefore should not be pulled from public repositories.
https://zego.engineering/dependency-confusion-in-aws-codeartifact-86b9ff68963d?gi=eb56bfabbd85
#aws
Medium
Dependency confusion in AWS CodeArtifact
Last year we found AWS Code Artifact to be vulnerable to dependency confusion. This blogs covers the disclosure and remediation process.
👏1
🔶 AWS Security by Dylan Shields
An excellent book by software engineer working on Quantum Computing at Amazon Dylan Shields describing that running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS.
#aws
An excellent book by software engineer working on Quantum Computing at Amazon Dylan Shields describing that running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS.
#aws
🔥3❤2
🔶 Uncomplicate Security for developers using Reference Architectures
Post walking through some of the salient features of a meaningful security reference architecture and the process required to develop one, as well as looking at the challenges that one might expect to face.
https://anunay-bhatt.medium.com/embedding-security-into-sdlc-using-reference-architectures-for-developers-29403c00fb3d
#aws
Post walking through some of the salient features of a meaningful security reference architecture and the process required to develop one, as well as looking at the challenges that one might expect to face.
https://anunay-bhatt.medium.com/embedding-security-into-sdlc-using-reference-architectures-for-developers-29403c00fb3d
#aws
🔥2
🔶 Setup GitHub Codespaces with AWS IAM Roles Anywhere
Demonstration of how you could leverage IAM Roles Anywhere to authenticate your GitHub Codespaces.
https://devopstar.com/2022/08/01/github-codespaces-and-iam-roles-anywhere
#aws
Demonstration of how you could leverage IAM Roles Anywhere to authenticate your GitHub Codespaces.
https://devopstar.com/2022/08/01/github-codespaces-and-iam-roles-anywhere
#aws
Devopstar
Setup GitHub Codespaces with AWS IAM Roles Anywhere
In this blog post, I'm going to try out AWS IAM Roles Anywhere by setting it up for use inside GitHub Codespaces. The [offical documentation…
👍1🔥1