CloudSec Wine
2.14K subscribers
912 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
๐Ÿ”ถ Recap of AWS re:Invent 2022: An Honest Review

Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.

https://www.resmo.com/blog/aws-reinvent-2022-recap

#aws
๐Ÿ”ฅ1
๐Ÿ”ท Palantir's FIDO2 secure implementation rollout

The second in a series by Palantir InfoSec on their journey enforcing FIDO2 authentication via hardware authenticators (YubiKeys) across all of Palantir.

https://blog.palantir.com/technical-controls-rollout-and-edge-cases-passwordless-authentication-series-2-c9b6dcd349e

#azure
๐Ÿ”ฅ1
๐Ÿ”ถ๐Ÿ”ด Compromised Cloud Compute Credentials: Case Studies From the Wild

A walk-through of attacks in the wild that abuse stolen cloud compute credentials in cloud environments.

https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials

#aws #gcp
๐Ÿ”ฅ1
๐Ÿ”ถ๐Ÿ”ท๐Ÿ”ด Visualizing Multi Cloud IAM Concepts

Some diagrams to understand key AWS, Azure and GCP IAM concepts and terminology.

https://julian-wieg.medium.com/visualizing-multi-cloud-iam-concepts-63525967c0a7

#aws #azure #gcp
โค1๐Ÿ”ฅ1
๐Ÿ”ด ine-labs/GCPGoat

A vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine.

https://github.com/ine-labs/GCPGoat

#gcp
๐Ÿ”ฅ3
๐Ÿ”ถ AWS ECR Public Vulnerability

A vulnerability that allowed external actors to delete, update, and create ECR Public images, layers, and tags in registries and repositories that belong to other AWS Accounts, by abusing undocumented internal ECR Public API actions.

https://blog.lightspin.io/aws-ecr-public-vulnerability

#aws
๐Ÿ”ฅ4
๐Ÿ”ถ Redshift Security: Attack Surface Explained

Understand how an attacker can leverage Redshift default permissions to perform lateral movement and privilege escalation.

https://www.dig.security/post/redshift-security-attack-surface-explained

#aws
๐Ÿ”ฅ3
๐Ÿ”ถ Unusual Cache Poisoning between Akamai and S3 buckets

A post presenting an unusual way of Cache Poisoning which happens between Akamai and Amazon S3 Buckets.

https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3

#aws
๐Ÿ”ฅ3
๐Ÿ”ถ How DoorDash Secures Data Transfer Between Cloud and On-Premise Data Centers

How DoorDash built a secure data transfer to a new payment processing vendor by establishing a private network link using AWS Direct Connect.

https://doordash.engineering/2022/11/29/how-doordash-secures-data-transfer-between-cloud-and-on-premise-data-centers

#aws
๐Ÿ”ฅ3
๐Ÿ”ถ๐Ÿ”ท๐Ÿ”ด Detecting Cloud Account Takeover Attacks

The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.

https://www.splunk.com/en_us/blog/security/detecting-cloud-account-takeover-attacks-threat-research-release-october-2022.html

#aws #azure #gcp
๐Ÿ”ฅ3
๐Ÿ”ด Google Cloud infrastructure reliability guide

Introduces the building blocks of reliability in Google Cloud, and provides architectural recommendations to design reliable infrastructure for your cloud workloads.

https://cloud.google.com/architecture/infra-reliability-guide

#gcp
๐Ÿ”ฅ1
๐Ÿ”ถ Configuration driven dynamic multi-account CI/CD solution on AWS

Post presenting a configuration driven dynamic CI/CD solution per repository.

https://aws.amazon.com/ru/blogs/devops/configuration-driven-dynamic-multi-account-ci-cd-solution-on-aws

#aws
๐Ÿ”ฅ2
๐Ÿ”ด How we validated the security controls of our new Confidential Space

A whitepaper demonstrating the level of security review and threat modelling any Google product goes through.

https://cloud.google.com/blog/products/identity-security/how-to-build-a-secure-confidential-space

#gcp
๐Ÿ”ฅ1
๐Ÿ”ถ Prepare for consolidated controls view and consolidated control findings in AWS Security Hub

Security Hub is aiming to release two new features in the first quarter of 2023 that will decouple controls from standards and streamline how you view and receive control findings.

https://aws.amazon.com/ru/blogs/security/prepare-for-consolidated-controls-view-and-consolidated-control-findings-in-aws-security-hub

#aws
๐Ÿ‘1๐Ÿ”ฅ1
๐Ÿ”ถ Advanced Notice: Amazon S3 will automatically enable S3 Block Public Access and disable access control lists for all new buckets starting in April 2023

Starting in April 2023, S3 will introduce two new default bucket security settings by automatically enabling S3 Block Public Access and disabling S3 access control lists (ACLs) for all new S3 buckets. There is no change for existing buckets.

https://aws.amazon.com/ru/about-aws/whats-new/2022/12/amazon-s3-automatically-enable-block-public-access-disable-access-control-lists-buckets-april-2023

#aws
๐Ÿ”ฅ3
๐Ÿ™‚ Dear friends,

Happy New Year 2023! ๐ŸŽ…

We wish you success in your personal and career achievements! Stay with us. This year we will continue to delight you with only high-quality content!

#HappyNewYear
๐Ÿ”ฅ5
๐Ÿ”ท Cross-tenant network bypass in Azure Cognitive Search

How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.

https://www.mnemonic.io/resources/blog/acsessed-cross-tenant-network-bypass-in-azure-cognitive-search

#azure
๐Ÿ”ฅ3๐Ÿ‘2
๐Ÿ”ถ Cloud Cred Harvesting Campaign

A credential harvesting campaign targeting cloud infrastructure. The majority of the victim system were running public facing Juptyer Notebooks.

https://permiso.io/blog/s/christmas-cloud-cred-harvesting-campaign

#aws
๐Ÿ”ฅ2
๐Ÿ”ท State of Azure IAM 2022

Azure IAM has seen major growth with 2710 new permissions and 60 new built-in roles added in 2022.

https://davidokeyode.medium.com/state-of-azure-iam-2022-512e66881128

#azure
๐Ÿ”ฅ2
๐Ÿ”ถ Cloud penetration testing: Not your typical internal penetration test

A funny post where the author shares the stages of ignorance and awareness they encountered, so to help others progress through the early stages more quickly than they did.

https://sethsec.blogspot.com/2022/12/cloud-penetration-testing-not-your.html?m=1

#aws
๐Ÿ”ฅ2
๐Ÿ”ถ Taking The New Secrets Manager Lambda Extension For a Spin

Aquiaโ€™s Dakota Riley compares the performance of the Secrets Manager Lambda Extension vs using the SDK directly for secrets retrieval.

https://blog.aquia.us/blog/2023-01-01-secrets-manager-lambda-extension

#aws
๐Ÿ”ฅ1