CloudSec Wine
2.13K subscribers
908 photos
18 files
1.25K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
AWS_Kali.pdf
36 MB
๐Ÿ”ธAWS Penetration Testing with Kali Linux

Key Features:
- Efficiently perform penetration testing techniques on your public cloud instances
- Learn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelines
- A step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environment

#aws
๐Ÿ”ธUse HashiCorp Vault AWS engine with multiple accounts

Post breaking down how the Vault secrets engine works and how to use it to dynamically create credentials across multiple AWS accounts using the assume_role feature.

https://nedinthecloud.com/2020/08/29/use-hashicorp-vault-aws-engine-with-multiple-accounts/

#aws
๐Ÿ”ธS3Insights: Derive insights about your S3 environment at scale

More neat work from Uberโ€™s Ashish Kurmi (See also: How Uber Continuously Monitors the Security of its AWS Environment). S3Insights is a platform for efficiently deriving security insights about S3 data through system metadata analysis. Rather than analyzing the content of individual objects, S3Insights harvests S3 inventory data from multiple buckets in a multi-account environment to help discover and manage sensitive data.

#aws
๐Ÿ”ธRecord AWS API calls to improve IAM Policies

Have you ever looked at an IAM policy and wondered: Is it really necessary to grant access to this specific action? CloudTrail can help here, but there is something better: Record API calls with Client Side Monitoring.

https://cloudonaut.io/record-aws-api-calls-to-improve-iam-policies/

#aws
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ธiam-policies-cli

A CLI tool for building simple to complex IAM policies based on CloudFormation templates.

https://github.com/mhlabs/iam-policies-cli

#aws
๐Ÿ”ธSecurity Architecture Review Of A Cloud Native Environment

Walkthrough of a cloud security assessment performed on an organisation which had recently moved their infrastructure from an on-prem to a cloud native solution (AWS).

https://notsosecure.com/security-architecture-review-of-a-cloud-native-environment/

#aws
๐Ÿ”ธAWS Digital Forensics Automation at Goldman Sachs

Goldman Sachs has automated an event-driven cloud response solution that uses AWS native services to successfully collect disk and memory evidence from Amazon EC2 instances. The solution uses AWS security services Amazon GuardDuty and AWS Security Hub. It also leverages a variety of services such as AWS Lambda, AWS Step Functions, and AWS Systems Manager (SSM). This Tech Talk provides an overview of Goldman Sachs' environment and a deep dive on how they built automation for digital forensics using AWS native services.

https://youtu.be/CR4_a-TO_gw

#aws
๐Ÿ”ธAWS IAM explained for Red and Blue teams

Article trying to shine some light on IAM, as well as some ways to enumerate it with different tools.

https://medium.com/bugbountywriteup/aws-iam-explained-for-red-and-blue-teams-2dda8b20fbf7

#aws
๐Ÿ”ธOffensive Terraform Modules

Collection of (automated) offensive attack modules defined as Infrastructure as Code (IAC).

https://offensive-terraform.github.io/

#aws
๐Ÿ”ท๐Ÿ”ธEnter the Vault: Authentication Issues in HashiCorp Vault

Project Zero found two vulnerabilities in HashiCorp Vault and its integration with AWS and GCP, which can lead to an authentication bypass in configurations that use the aws and gcp auth methods. Both vulnerabilities (CVE-2020-16250/16251) were addressed by HashiCorp and are fixed in Vault versions 1.2.5, 1.3.8, 1.4.4 and 1.5.1 released in August.

https://googleprojectzero.blogspot.com/2020/10/enter-the-vault-auth-issues-hashicorp-vault.html

#aws #gcp
๐Ÿ”ธA visual introduction to AWS Lambda permissions

Article explaining with visual examples the AWS Lambda permission model, focusing on cross-account access and the principle of least privilege.

https://dev.to/harprit/a-visual-introduction-to-aws-lambda-permissions-1k87

#aws
๐Ÿ”ธUse AWS Lambda Extensions to Securely Retrieve Secrets From HashiCorp Vault

HashiCorp announced the public preview of a HashiCorp Vault AWS Lambda extension, utilizing the newly announced AWS Lambda Extensions API (also in public preview) to securely retrieve secrets from HashiCorp Vault.

https://www.hashicorp.com/blog/aws-lambda-extensions-for-hashicorp-vault

#aws
๐Ÿ”ธBuilding the Next Evolution of Cloud Networks at Slack

An overview of the design decisions and tech choices made along the way for Slackโ€™s brand-new network architecture redesign project.

https://slack.engineering/building-the-next-evolution-of-cloud-networks-at-slack/

#aws
๐Ÿ”ธPublic dataset of Cloudtrail logs from flaws.cloud

Scott Piper has released anonymized CloudTrail logs from flaws.cloud, his hands-on, free AWS security training challenges. The logs are roughly 240MB of largely attack data, covering over a 3.5 year span.

https://summitroute.com/blog/2020/10/09/public_dataset_of_cloudtrail_logs_from_flaws_cloud/

#aws
๐Ÿ”ธAutomate AWS Firewall Manager onboarding using AWS Centralized WAF and VPC Security Group Management solution

Learn how to automate AWS Firewall Manager onboarding using AWS Centralized WAF and VPC Security Group Management solution:
https://aws.amazon.com/ru/blogs/security/automate-aws-firewall-manager-onboarding-using-aws-centralized-waf-and-vpc-security-group-management-solution/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security&sc_geo=GLOBAL&sc_outcome=adoption&trk=AWSSecurity_Blog_TWITTER&linkId=102181910

#aws
AWS_Security_Best_Practices.pdf
907.2 KB
๐Ÿ”ธAWS Security Best Practices
August 2016

"We address the following topics:
โ€ข How security responsibilities are shared between AWS and you, the customer
โ€ข How to define and categorize your assets
โ€ข How to manage user access to your data using privileged accounts and groups
โ€ข Best practices for securing your data, operating systems, andnetwork
โ€ข How monitoring and alerting can help you achieve your security objectives

This whitepaper discusses security best practices in these areas at a high level"

#aws
๐Ÿ”ธ๐Ÿ”ท๐Ÿ”ดCloudSecDocs - very cool website about AWS, GCP, Azure and Container Security

For this moment:
- Access Management
- Infrastructure Security
- Logging & Monitoring
- Compute
- Storage
- Dev
- Offensive / Pentest
- Devops

cloudsecdocs.com

#aws #azure #gcp
๐Ÿ”ธSecure data in AWS with Key Management Service (KMS)

Guide explaining core KMS concepts and showing how to encrypt your data and scale your data access management uniformly across disparate data services.

https://k9security.io/docs/secure-data-in-aws-with-key-management-service-kms/

#aws