CloudSec Wine
2.13K subscribers
912 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
πŸ”ΆπŸ”΄ Email Graffiti: hacking old email

Hacking images in old Emails, by registering the buckets or domains they point to, allows to vandalize old emails.

https://trufflesecurity.com/blog/email-graffiti

#aws #gcp
πŸ‘3
πŸ”Ά AWS pre:Invent 2022

Chris Farris highlights AWS's interesting and impactful security announcements in the lead-up to AWS re:Invent.

https://steampipe.io/blog/pre-invent-2022

#aws
πŸ”₯1
πŸ”Ά reply-fr/sustainable-personal-accounts

Add custom maintenance windows for AWS accounts - purge and prepare resources automatically.

https://github.com/reply-fr/sustainable-personal-accounts

#aws
πŸ”₯1
πŸ”· Yet Another Azure VM Persistence Using Bastion Shareable Links

These links have no additional authentication and are publicly accessible.

https://blog.karims.cloud/2022/11/26/yet-another-azure-vm-persistence.html

#azure
πŸ”₯2
πŸ”Ά Amazon Security Lake

A purpose-built service that automatically centralizes an organization's security data from cloud and on-premises sources into a purpose-built data lake stored in your account.

https://aws.amazon.com/ru/blogs/aws/preview-amazon-security-lake-a-purpose-built-customer-owned-data-lake-service

#aws
πŸ”₯3πŸ‘1
πŸ”· Low-latency fraud detection with Cloud Bigtable

Explore the end to end flow of detecting fraudulent payments with a low-latency and horizontally scalable system powered by tools like Bigtable.

https://cloud.google.com/blog/products/databases/fraud-detection-with-cloud-bigtable

#azure
πŸ‘1πŸ‘1
πŸ”Ά Protect Sensitive Data with Amazon CloudWatch Logs

A new set of capabilities for Amazon CloudWatch Logs that leverage pattern matching and machine learning (ML) to detect and protect sensitive log data in transit.

https://aws.amazon.com/ru/blogs/aws/protect-sensitive-data-with-amazon-cloudwatch-logs

#aws
πŸ”₯3
πŸ”· Explore the new Learn Kubernetes with Google website

The new website Learn Kubernetes with Google brings together under one roof the guidance of Kubernetes experts, both from Google and across the industry, to communicate the latest trends in building your Kubernetes infrastructure.

https://opensource.googleblog.com/2022/11/explore-new-learn-kubernetes-with-google-website.html

#azure
πŸ”₯2πŸ‘1
πŸ”Ά Recap of AWS re:Invent 2022: An Honest Review

Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.

https://www.resmo.com/blog/aws-reinvent-2022-recap

#aws
πŸ”₯1
πŸ”· Palantir's FIDO2 secure implementation rollout

The second in a series by Palantir InfoSec on their journey enforcing FIDO2 authentication via hardware authenticators (YubiKeys) across all of Palantir.

https://blog.palantir.com/technical-controls-rollout-and-edge-cases-passwordless-authentication-series-2-c9b6dcd349e

#azure
πŸ”₯1
πŸ”ΆπŸ”΄ Compromised Cloud Compute Credentials: Case Studies From the Wild

A walk-through of attacks in the wild that abuse stolen cloud compute credentials in cloud environments.

https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials

#aws #gcp
πŸ”₯1
πŸ”ΆπŸ”·πŸ”΄ Visualizing Multi Cloud IAM Concepts

Some diagrams to understand key AWS, Azure and GCP IAM concepts and terminology.

https://julian-wieg.medium.com/visualizing-multi-cloud-iam-concepts-63525967c0a7

#aws #azure #gcp
❀1πŸ”₯1
πŸ”΄ ine-labs/GCPGoat

A vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine.

https://github.com/ine-labs/GCPGoat

#gcp
πŸ”₯3
πŸ”Ά AWS ECR Public Vulnerability

A vulnerability that allowed external actors to delete, update, and create ECR Public images, layers, and tags in registries and repositories that belong to other AWS Accounts, by abusing undocumented internal ECR Public API actions.

https://blog.lightspin.io/aws-ecr-public-vulnerability

#aws
πŸ”₯4
πŸ”Ά Redshift Security: Attack Surface Explained

Understand how an attacker can leverage Redshift default permissions to perform lateral movement and privilege escalation.

https://www.dig.security/post/redshift-security-attack-surface-explained

#aws
πŸ”₯3
πŸ”Ά Unusual Cache Poisoning between Akamai and S3 buckets

A post presenting an unusual way of Cache Poisoning which happens between Akamai and Amazon S3 Buckets.

https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3

#aws
πŸ”₯3
πŸ”Ά How DoorDash Secures Data Transfer Between Cloud and On-Premise Data Centers

How DoorDash built a secure data transfer to a new payment processing vendor by establishing a private network link using AWS Direct Connect.

https://doordash.engineering/2022/11/29/how-doordash-secures-data-transfer-between-cloud-and-on-premise-data-centers

#aws
πŸ”₯3
πŸ”ΆπŸ”·πŸ”΄ Detecting Cloud Account Takeover Attacks

The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.

https://www.splunk.com/en_us/blog/security/detecting-cloud-account-takeover-attacks-threat-research-release-october-2022.html

#aws #azure #gcp
πŸ”₯3
πŸ”΄ Google Cloud infrastructure reliability guide

Introduces the building blocks of reliability in Google Cloud, and provides architectural recommendations to design reliable infrastructure for your cloud workloads.

https://cloud.google.com/architecture/infra-reliability-guide

#gcp
πŸ”₯1
πŸ”Ά Configuration driven dynamic multi-account CI/CD solution on AWS

Post presenting a configuration driven dynamic CI/CD solution per repository.

https://aws.amazon.com/ru/blogs/devops/configuration-driven-dynamic-multi-account-ci-cd-solution-on-aws

#aws
πŸ”₯2
πŸ”΄ How we validated the security controls of our new Confidential Space

A whitepaper demonstrating the level of security review and threat modelling any Google product goes through.

https://cloud.google.com/blog/products/identity-security/how-to-build-a-secure-confidential-space

#gcp
πŸ”₯1