CloudSec Wine
🔷 Automating Azure Abuse Research A step-by-step process for automating Azure abuse research, with examples for Azure Virtual Machines and their Managed Identities. https://posts.specterops.io/automating-azure-abuse-research-part-1-30b0eca33418 #azure
🔷 Automating Azure Abuse Research - Part 2
Second part of a series, this time focusing on how to use the BloodHound Attack Research Kit (BARK) to perform so-called "continuous abuse primitive validation".
https://posts.specterops.io/automating-azure-abuse-research-part-2-3e5bbe7a20c0
#azure
Second part of a series, this time focusing on how to use the BloodHound Attack Research Kit (BARK) to perform so-called "continuous abuse primitive validation".
https://posts.specterops.io/automating-azure-abuse-research-part-2-3e5bbe7a20c0
#azure
Medium
Automating Azure Abuse Research — Part 2
In Part 1 of this series, we looked at how to port functionality from the Azure GUI to PowerShell. Specifically, we looked at how to…
🔥2
🔶 AWS IAM Interview Questions
Some AWS IAM interview questions to help understand how much an engineer might know about AWS IAM, and how to apply it.
https://www.k9security.io/docs/aws-iam-interview-questions
#aws
Some AWS IAM interview questions to help understand how much an engineer might know about AWS IAM, and how to apply it.
https://www.k9security.io/docs/aws-iam-interview-questions
#aws
👍3
🔷 SMTP Matching Abuse in Azure AD
How SMTP matching can be abused to obtain privileged access via eligible role assignments, and how to prevent it.
https://www.semperis.com/blog/smtp-matching-abuse-in-azure-ad
#azure
How SMTP matching can be abused to obtain privileged access via eligible role assignments, and how to prevent it.
https://www.semperis.com/blog/smtp-matching-abuse-in-azure-ad
#azure
Semperis
SMTP Matching Abuse in Azure AD - Semperis
Attackers can use SMTP matching to hijack Azure AD. Read our recent post "SMTP Matching Abuse in Azure AD" to learn more.
🔥1
🔶 Incident Response in AWS
Post intended to help those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.
https://www.chrisfarris.com/post/aws-ir
#aws
Post intended to help those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.
https://www.chrisfarris.com/post/aws-ir
#aws
🔥1
🔶 CJ Moses might be the CISO of AWS, but service leaders own their own security
Interesting interview with AWS’s CJ Moses covering topics including:
1️⃣ What are your duties as CISO?
2️⃣ What is AWS’ security strategy?
3️⃣ What’s the biggest threat to cloud security right now and how do you stay ahead of all these bad actors?
4️⃣ What are the biggest security mistakes that you see enterprise customers repeating?
https://www.protocol.com/enterprise/cj-moses-aws-ciso
#aws
Interesting interview with AWS’s CJ Moses covering topics including:
1️⃣ What are your duties as CISO?
2️⃣ What is AWS’ security strategy?
3️⃣ What’s the biggest threat to cloud security right now and how do you stay ahead of all these bad actors?
4️⃣ What are the biggest security mistakes that you see enterprise customers repeating?
https://www.protocol.com/enterprise/cj-moses-aws-ciso
#aws
Protocol
CJ Moses might be the CISO of AWS, but service leaders own their own security
Moses, a former FBI tech leader and one-time AWS customer, thinks Amazon’s culture of ownership helps him secure AWS because executives are taught that they are directly responsible for the security of their services.
🔥2👍1
🔶 Attacking Firecracker: AWS' microVM Monitor Written in Rust
Firecracker is a microVM manager in Rust that powers AWS services like Lambda and Fargate. Here's how a red team team attacked a vulnerability in Firecracker.
https://www.graplsecurity.com/post/attacking-firecracker
#aws
Firecracker is a microVM manager in Rust that powers AWS services like Lambda and Fargate. Here's how a red team team attacked a vulnerability in Firecracker.
https://www.graplsecurity.com/post/attacking-firecracker
#aws
🔥2
🔶 A Federated Approach To Providing User Privacy Rights
How Lyft approaches managing user privacy in order to seamlessly handle compliance, data export, and deletion.
https://eng.lyft.com/a-federated-approach-to-providing-user-privacy-rights-3d9ab73441d9
#aws
How Lyft approaches managing user privacy in order to seamlessly handle compliance, data export, and deletion.
https://eng.lyft.com/a-federated-approach-to-providing-user-privacy-rights-3d9ab73441d9
#aws
🔥1
🔶 The Complete Guide to AWS KMS
An intro guide to AWS Key Management Service (AWS KMS), its different key types, and access (IAM) best practices.
https://blog.lightspin.io/the-complete-guide-to-aws-kms
#aws
An intro guide to AWS Key Management Service (AWS KMS), its different key types, and access (IAM) best practices.
https://blog.lightspin.io/the-complete-guide-to-aws-kms
#aws
👏2
🔴 Understanding basic networking in GKE - Networking basics
Post exploring the networking components of GKE and the various options that exist.
https://cloud.google.com/blog/topics/developers-practitioners/understanding-basic-networking-gke-networking-basics
#gcp
Post exploring the networking components of GKE and the various options that exist.
https://cloud.google.com/blog/topics/developers-practitioners/understanding-basic-networking-gke-networking-basics
#gcp
Google Cloud Blog
Understanding basic networking in GKE - Networking basics | Google Cloud Blog
👍2🔥1
🔶 awslabs/aws-security-assessment-solution
An AWS tool to help you create a point in time assessment of your AWS account using Prowler and Scout as well as optional AWS developed ransomware checks.
https://github.com/awslabs/aws-security-assessment-solution
#aws
An AWS tool to help you create a point in time assessment of your AWS account using Prowler and Scout as well as optional AWS developed ransomware checks.
https://github.com/awslabs/aws-security-assessment-solution
#aws
🔥3
🔷 Azure Active Directory Pass-Through Authentication Flaws
Secureworks researchers analyzed how the protocols used by Pass-Through Authentication (PTA) could be exploited. The result? A compromised PTA agent certificate gives threat actors persistent and undetectable access to a target organization.
https://www.secureworks.com/research/azure-active-directory-pass-through-authentication-flaws
#azure
Secureworks researchers analyzed how the protocols used by Pass-Through Authentication (PTA) could be exploited. The result? A compromised PTA agent certificate gives threat actors persistent and undetectable access to a target organization.
https://www.secureworks.com/research/azure-active-directory-pass-through-authentication-flaws
#azure
Secureworks
Azure Active Directory Pass-Through Authentication Flaws
In May 2022, Secureworks® Counter Threat Unit™ (CTU) researchers analyzed how the protocols used by Pass-Through Authentication could be exploited.
🔥1
🔶 AWS Ramp-Up Guide: Security
A guide that can help you prepare for the "AWS Certified Security - Specialty" certification exam.
https://d1.awsstatic.com/training-and-certification/ramp-up_guides/Ramp-Up_Guide_Security.pdf
#aws
A guide that can help you prepare for the "AWS Certified Security - Specialty" certification exam.
https://d1.awsstatic.com/training-and-certification/ramp-up_guides/Ramp-Up_Guide_Security.pdf
#aws
🔥4
🔶 matanolabs/matano
An open source security lake platform for AWS that lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting. Matano is fully serverless and designed specifically for AWS and focuses on enabling high scale, low cost, and zero-ops.
https://github.com/matanolabs/matano
#aws
An open source security lake platform for AWS that lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting. Matano is fully serverless and designed specifically for AWS and focuses on enabling high scale, low cost, and zero-ops.
https://github.com/matanolabs/matano
#aws
👍1🔥1
🔶 Authenticating to AWS the right way for (almost) every use-case
Lee Briggs covers the right way to authenticate to AWS in a variety of scenarios:
1️⃣ Authenticate to AWS as a Human User: AWS IAM Identity Center
2️⃣ Authenticate to AWS as an EC2 Instance: IAM Role, possibly Instance Profile
3️⃣ Authenticate to AWS as an application that only manages content in an S3 bucket: Presigned URLs
4️⃣ Authenticate to AWS as a CI/CD Pipeline: OIDC Providers
5️⃣ Authenticate to AWS as compute I manage that isn’t running inside AWS: IAM Roles Anywhere
https://leebriggs.co.uk/blog/2022/09/05/authenticating-to-aws-the-right-way
#aws
Lee Briggs covers the right way to authenticate to AWS in a variety of scenarios:
1️⃣ Authenticate to AWS as a Human User: AWS IAM Identity Center
2️⃣ Authenticate to AWS as an EC2 Instance: IAM Role, possibly Instance Profile
3️⃣ Authenticate to AWS as an application that only manages content in an S3 bucket: Presigned URLs
4️⃣ Authenticate to AWS as a CI/CD Pipeline: OIDC Providers
5️⃣ Authenticate to AWS as compute I manage that isn’t running inside AWS: IAM Roles Anywhere
https://leebriggs.co.uk/blog/2022/09/05/authenticating-to-aws-the-right-way
#aws
🔥3
🔶 thundra-io/merloc
By Thundra: A live AWS Lambda function development and debugging tool. MerLoc allows you to run AWS Lambda functions on your local while they are still part of a flow in the AWS cloud remote.
https://github.com/thundra-io/merloc
#aws
By Thundra: A live AWS Lambda function development and debugging tool. MerLoc allows you to run AWS Lambda functions on your local while they are still part of a flow in the AWS cloud remote.
https://github.com/thundra-io/merloc
#aws
👍1🔥1
🔷 Azure Cloud Shell Command Injection: Stealing User's Access Tokens
This post describes how a researcher took over an Azure Cloud Shell trusted domain and leveraged it to inject and execute commands in other users' terminals.
https://blog.lightspin.io/azure-cloud-shell-command-injection-stealing-users-access-tokens
#azure
This post describes how a researcher took over an Azure Cloud Shell trusted domain and leveraged it to inject and execute commands in other users' terminals.
https://blog.lightspin.io/azure-cloud-shell-command-injection-stealing-users-access-tokens
#azure
🔥1
🔷 Azure Attack Paths
Post shedding some light on known attack paths in an Azure environment.
https://cloudbrothers.info/azure-attack-paths
#azure
Post shedding some light on known attack paths in an Azure environment.
https://cloudbrothers.info/azure-attack-paths
#azure
🔥3
🔶 AWS IAM Identity Center Access Tokens are Stored in Clear Text and No, That's Not a Critical Vulnerability
Assuming constant full compromise of all machines is probably going to lead to controls where users can't reasonably do work.
https://itnext.io/aws-iam-identity-center-access-tokens-are-stored-in-clear-text-and-no-thats-not-a-critical-68a48c1e398
#aws
Assuming constant full compromise of all machines is probably going to lead to controls where users can't reasonably do work.
https://itnext.io/aws-iam-identity-center-access-tokens-are-stored-in-clear-text-and-no-thats-not-a-critical-68a48c1e398
#aws
🔥1
🔶 How DoorDash Ensures Velocity and Reliability through Policy Automation
How DoorDash leverages OPA to build policy-based guardrails with codified rules that ensure velocity and reliability for cloud infrastructure automated deployments.
https://doordash.engineering/2022/09/20/how-doordash-ensures-velocity-and-reliability-through-policy-automation
#aws
How DoorDash leverages OPA to build policy-based guardrails with codified rules that ensure velocity and reliability for cloud infrastructure automated deployments.
https://doordash.engineering/2022/09/20/how-doordash-ensures-velocity-and-reliability-through-policy-automation
#aws
🔥1
🔶 zoph-io/aws-security-survival-kit
Victor Grenu helps you set up minimal alerting on typical suspicious activities on your AWS Account. Using this kit, you will deploy CloudWatch EventRules and CW alarms on:
1️⃣ Root User activities
2️⃣ CloudTrail changes
3️⃣ AWS Personal Health Events
4️⃣ IAM Users changes
5️⃣ MFA updates
6️⃣ Unauthorized Operations
7️⃣ Failed AWS Console login authentication
https://github.com/zoph-io/aws-security-survival-kit
#aws
Victor Grenu helps you set up minimal alerting on typical suspicious activities on your AWS Account. Using this kit, you will deploy CloudWatch EventRules and CW alarms on:
1️⃣ Root User activities
2️⃣ CloudTrail changes
3️⃣ AWS Personal Health Events
4️⃣ IAM Users changes
5️⃣ MFA updates
6️⃣ Unauthorized Operations
7️⃣ Failed AWS Console login authentication
https://github.com/zoph-io/aws-security-survival-kit
#aws
👍1🔥1
🔶 Using Kyverno To Enforce AWS Load Balancer Annotations For Centralized Logging To S3
Post covering the steps to take in order to use Kyverno to automatically configure the annotations that enable access logs for an AWS Network Load Balancer (NLB) to be forwarded to an S3 bucket.
https://silvr.medium.com/using-kyverno-to-enforce-aws-load-balancer-annotations-for-centralized-logging-to-s3-af5dc1f1f3e0
#aws
Post covering the steps to take in order to use Kyverno to automatically configure the annotations that enable access logs for an AWS Network Load Balancer (NLB) to be forwarded to an S3 bucket.
https://silvr.medium.com/using-kyverno-to-enforce-aws-load-balancer-annotations-for-centralized-logging-to-s3-af5dc1f1f3e0
#aws
👍1🔥1