CloudSec Wine
2.14K subscribers
909 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 AWS IAM Interview Questions

Some AWS IAM interview questions to help understand how much an engineer might know about AWS IAM, and how to apply it.

https://www.k9security.io/docs/aws-iam-interview-questions

#aws
👍3
🔷 SMTP Matching Abuse in Azure AD

How SMTP matching can be abused to obtain privileged access via eligible role assignments, and how to prevent it.

https://www.semperis.com/blog/smtp-matching-abuse-in-azure-ad

#azure
🔥1
🔶 Incident Response in AWS

Post intended to help those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.

https://www.chrisfarris.com/post/aws-ir

#aws
🔥1
🔶 CJ Moses might be the CISO of AWS, but service leaders own their own security

Interesting interview with AWS’s CJ Moses covering topics including:

1️⃣ What are your duties as CISO?
2️⃣ What is AWS’ security strategy?
3️⃣ What’s the biggest threat to cloud security right now and how do you stay ahead of all these bad actors?
4️⃣ What are the biggest security mistakes that you see enterprise customers repeating?

https://www.protocol.com/enterprise/cj-moses-aws-ciso

#aws
🔥2👍1
🔶 Attacking Firecracker: AWS' microVM Monitor Written in Rust

Firecracker is a microVM manager in Rust that powers AWS services like Lambda and Fargate. Here's how a red team team attacked a vulnerability in Firecracker.

https://www.graplsecurity.com/post/attacking-firecracker

#aws
🔥2
🔶 A Federated Approach To Providing User Privacy Rights

How Lyft approaches managing user privacy in order to seamlessly handle compliance, data export, and deletion.

https://eng.lyft.com/a-federated-approach-to-providing-user-privacy-rights-3d9ab73441d9

#aws
🔥1
🔶 The Complete Guide to AWS KMS

An intro guide to AWS Key Management Service (AWS KMS), its different key types, and access (IAM) best practices.

https://blog.lightspin.io/the-complete-guide-to-aws-kms

#aws
👏2
🔴 Understanding basic networking in GKE - Networking basics

Post exploring the networking components of GKE and the various options that exist.

https://cloud.google.com/blog/topics/developers-practitioners/understanding-basic-networking-gke-networking-basics

#gcp
👍2🔥1
🔶 awslabs/aws-security-assessment-solution

An AWS tool to help you create a point in time assessment of your AWS account using Prowler and Scout as well as optional AWS developed ransomware checks.

https://github.com/awslabs/aws-security-assessment-solution

#aws
🔥3
🔷 Azure Active Directory Pass-Through Authentication Flaws

Secureworks researchers analyzed how the protocols used by Pass-Through Authentication (PTA) could be exploited. The result? A compromised PTA agent certificate gives threat actors persistent and undetectable access to a target organization.

https://www.secureworks.com/research/azure-active-directory-pass-through-authentication-flaws

#azure
🔥1
🔶 AWS Ramp-Up Guide: Security

A guide that can help you prepare for the "AWS Certified Security - Specialty" certification exam.

https://d1.awsstatic.com/training-and-certification/ramp-up_guides/Ramp-Up_Guide_Security.pdf

#aws
🔥4
🔶 matanolabs/matano

An open source security lake platform for AWS that lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting. Matano is fully serverless and designed specifically for AWS and focuses on enabling high scale, low cost, and zero-ops.

https://github.com/matanolabs/matano

#aws
👍1🔥1
🔶 Authenticating to AWS the right way for (almost) every use-case

Lee Briggs covers the right way to authenticate to AWS in a variety of scenarios:

1️⃣ Authenticate to AWS as a Human User: AWS IAM Identity Center

2️⃣ Authenticate to AWS as an EC2 Instance: IAM Role, possibly Instance Profile

3️⃣ Authenticate to AWS as an application that only manages content in an S3 bucket: Presigned URLs

4️⃣ Authenticate to AWS as a CI/CD Pipeline: OIDC Providers

5️⃣ Authenticate to AWS as compute I manage that isn’t running inside AWS: IAM Roles Anywhere

https://leebriggs.co.uk/blog/2022/09/05/authenticating-to-aws-the-right-way

#aws
🔥3
🔶 thundra-io/merloc

By Thundra: A live AWS Lambda function development and debugging tool. MerLoc allows you to run AWS Lambda functions on your local while they are still part of a flow in the AWS cloud remote.

https://github.com/thundra-io/merloc

#aws
👍1🔥1
🔷 Azure Cloud Shell Command Injection: Stealing User's Access Tokens

This post describes how a researcher took over an Azure Cloud Shell trusted domain and leveraged it to inject and execute commands in other users' terminals.

https://blog.lightspin.io/azure-cloud-shell-command-injection-stealing-users-access-tokens

#azure
🔥1
🔷 Azure Attack Paths

Post shedding some light on known attack paths in an Azure environment.

https://cloudbrothers.info/azure-attack-paths

#azure
🔥3
🔶 AWS IAM Identity Center Access Tokens are Stored in Clear Text and No, That's Not a Critical Vulnerability

Assuming constant full compromise of all machines is probably going to lead to controls where users can't reasonably do work.

https://itnext.io/aws-iam-identity-center-access-tokens-are-stored-in-clear-text-and-no-thats-not-a-critical-68a48c1e398

#aws
🔥1
🔶 How DoorDash Ensures Velocity and Reliability through Policy Automation

How DoorDash leverages OPA to build policy-based guardrails with codified rules that ensure velocity and reliability for cloud infrastructure automated deployments.

https://doordash.engineering/2022/09/20/how-doordash-ensures-velocity-and-reliability-through-policy-automation

#aws
🔥1
🔶 zoph-io/aws-security-survival-kit

Victor Grenu helps you set up minimal alerting on typical suspicious activities on your AWS Account. Using this kit, you will deploy CloudWatch EventRules and CW alarms on:

1️⃣ Root User activities
2️⃣ CloudTrail changes
3️⃣ AWS Personal Health Events
4️⃣ IAM Users changes
5️⃣ MFA updates
6️⃣ Unauthorized Operations
7️⃣ Failed AWS Console login authentication

https://github.com/zoph-io/aws-security-survival-kit

#aws
👍1🔥1
🔶 Using Kyverno To Enforce AWS Load Balancer Annotations For Centralized Logging To S3

Post covering the steps to take in order to use Kyverno to automatically configure the annotations that enable access logs for an AWS Network Load Balancer (NLB) to be forwarded to an S3 bucket.

https://silvr.medium.com/using-kyverno-to-enforce-aws-load-balancer-annotations-for-centralized-logging-to-s3-af5dc1f1f3e0

#aws
👍1🔥1