CloudSec Wine
2.14K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶awslabs/assisted-log-enabler-for-aws

Assisted Log Enabler for AWS is for customers who do not have logging turned on for various services, and lack knowledge of best practices and/or how to turn them on.

https://github.com/awslabs/assisted-log-enabler-for-aws

#aws
👏2
🔷Automating Insecurity In Azure

Slides of the homonym talk at cloudvillage_dc (on Twitter).

https://notpayloads.blob.core.windows.net/slides/DC-AzureAutomationAccounts.pdf

#azure
👍3
🔶How to setup geofencing and IP allow-list for Cognito user pool

AWS announced a new feature this week that lets you enable WAF protection for Cognito user pools. And one of the things you can do with this is to implement geo-fencing and IP allow/deny lists.

https://theburningmonk.com/2022/08/how-to-setup-geofencing-and-ip-allow-list-for-cognito-user-pool

#aws
🔥1
Специальный выпуск Monthly Cloud News, посвященный информационной безопасности в облаке

В беседе Антона Черноусова с Алексеем Миртовым и Евгением Сидоровым окунемся в вопросы терзающие безопасников и разработчиков, ведущих проекты в облаке.

Темы августовского выпуска:

🔹 IT-сотрудники хотят в облака
🔹 Лучше ли безопаснику в облаке?
🔹 Обсудим топ-рисков ИБ в облаках
🔹 Утечки статических Сredentials
🔹 DevSecOps как симбиоз полезных практик для разработки
🔹 Audit Trails и все все все...
🔹 Повышение культуры разработки через обучение ИБ

Регистрируйтесь!

#advertising
🔥5👍1
🔶How to detect suspicious activity in your AWS account by using private decoy resources

AWS’s Maitreya Ranganath and Mark Keating describe how you can create low-cost private decoy AWS resources in your AWS accounts and configure them to generate alerts when they are accessed.

https://aws.amazon.com/ru/blogs/security/how-to-detect-suspicious-activity-in-your-aws-account-by-using-private-decoy-resources

#aws
🔥2
🔴 Controls to restrict access to individually approved APIs

How to restrict access to individually approved Google APIs using the Organization Policy Service and other network controls.

https://cloud.google.com/architecture/network-controls-limit-access-individually-approved-apis

#gcp
👍1
🔶 AWS WAF Fraud Control - Account takeover prevention for Amazon CloudFront

AWS WAF Fraud Control - Account Takeover Prevention protects your application's login page against credential stuffing attacks, brute force attempts, and other anomalous login activities.

https://aws.amazon.com/ru/about-aws/whats-new/2022/08/aws-waf-fraud-control-account-takeover-prevention-cloudfront

#aws
🔥1
🔴 Announcing Virtual Machine Threat Detection now generally available to Cloud customers

Google announced that Virtual Machine Threat Detection (VMTD) in Security Command Center is now generally available for all Google Cloud customers.

https://cloud.google.com/blog/products/identity-security/introducing-virtual-machine-threat-detection-to-block-critical-threats

#gcp
🔥2
🔷 Securing Azure middleware agents with new auto-patching capabilities

It turns out when you require your customers to manually patch critical vulnerabilities in software you installed for them that they often don’t know they have, update rates are low. Nice work from Wiz in pushing for auto-patching functionality.

https://www.wiz.io/blog/auto-patching-for-omi

#azure
🔥1
🔶 AWS IAM Interview Questions

Some AWS IAM interview questions to help understand how much an engineer might know about AWS IAM, and how to apply it.

https://www.k9security.io/docs/aws-iam-interview-questions

#aws
👍3
🔷 SMTP Matching Abuse in Azure AD

How SMTP matching can be abused to obtain privileged access via eligible role assignments, and how to prevent it.

https://www.semperis.com/blog/smtp-matching-abuse-in-azure-ad

#azure
🔥1
🔶 Incident Response in AWS

Post intended to help those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.

https://www.chrisfarris.com/post/aws-ir

#aws
🔥1
🔶 CJ Moses might be the CISO of AWS, but service leaders own their own security

Interesting interview with AWS’s CJ Moses covering topics including:

1️⃣ What are your duties as CISO?
2️⃣ What is AWS’ security strategy?
3️⃣ What’s the biggest threat to cloud security right now and how do you stay ahead of all these bad actors?
4️⃣ What are the biggest security mistakes that you see enterprise customers repeating?

https://www.protocol.com/enterprise/cj-moses-aws-ciso

#aws
🔥2👍1
🔶 Attacking Firecracker: AWS' microVM Monitor Written in Rust

Firecracker is a microVM manager in Rust that powers AWS services like Lambda and Fargate. Here's how a red team team attacked a vulnerability in Firecracker.

https://www.graplsecurity.com/post/attacking-firecracker

#aws
🔥2
🔶 A Federated Approach To Providing User Privacy Rights

How Lyft approaches managing user privacy in order to seamlessly handle compliance, data export, and deletion.

https://eng.lyft.com/a-federated-approach-to-providing-user-privacy-rights-3d9ab73441d9

#aws
🔥1
🔶 The Complete Guide to AWS KMS

An intro guide to AWS Key Management Service (AWS KMS), its different key types, and access (IAM) best practices.

https://blog.lightspin.io/the-complete-guide-to-aws-kms

#aws
👏2
🔴 Understanding basic networking in GKE - Networking basics

Post exploring the networking components of GKE and the various options that exist.

https://cloud.google.com/blog/topics/developers-practitioners/understanding-basic-networking-gke-networking-basics

#gcp
👍2🔥1