CloudSec Wine
2.19K subscribers
973 photos
19 files
1.31K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
πŸ”Ά Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide

A popular passwordless authentication method is magic links. Although this is not something that Cognito supports out of the box, it can be implemented using its Lambda hooks.

https://theburningmonk.com/2023/03/implementing-magic-links-with-amazon-cognito-a-step-by-step-guide

#aws
πŸ”₯2
πŸ”Ά The illustrated guide to S3 pre-signed URLs

Article discussing in great detail what pre-signed URLs are, how to use them, and some best practices to keep in mind.

https://fourtheorem.com/the-illustrated-guide-to-s3-pre-signed-urls

#aws
πŸ”₯4
πŸ”· Super FabriXss: From XSS to an RCE in Azure Service Fabric Explorer by Abusing an Event Tab Cluster Toggle

Post exploring the details of the Azure vulnerability, "Super FabriXss," the risks it poses, as well as recommendations on how to mitigate it.

https://orca.security/resources/blog/super-fabrixss-azure-vulnerability

#azure
πŸ”₯2
πŸ”Ά Zero Trust Access to Private Webapps on AWS ECS with Cloudflare Tunnel

How to use Cloudflare Tunnel to securely access a Flask webapp running in a private subnet in ECS on Fargate, without exposing the app to the public internet.

https://blog.marcolancini.it/2023/blog-cloudflare-tunnel-zero-trust-ecs

#aws
πŸ”₯3
πŸ”· Riding the Azure Service Bus (Relay) into Power Platform

A deserialization issue on the Azure Service Bus (Relay) service that allowed remote code execution on Microsoft servers.

https://www.netspi.com/blog/technical/vulnerability-research/azure-service-bus-power-platform

#azure
πŸ”₯1
πŸ”Ά AWS KMS Threat Model

What are the threats in letting an AWS service manage the encryption of your data instead of creating a Customer Managed Key?

https://airwalkreply.com/aws-kms-threat-model

#aws
πŸ”₯5
πŸ”· Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI

Security Copilot combines an advanced large language model (LLM) with a security-specific model from Microsoft. This security-specific model in turn incorporates a set of security-specific skills and is informed by Microsoft's unique global threat intelligence. Security Copilot runs on Azure's infrastructure.

https://blogs.microsoft.com/blog/2023/03/28/introducing-microsoft-security-copilot-empowering-defenders-at-the-speed-of-ai

#azure
πŸ”₯1
πŸ”Ά Exploring Amazon VPC Lattice

AWS has recently released VPC Lattice to General Availability. This post walks through creating a simple VPC Lattice service using CloudFormation, and takes a look at the service overall.

https://onecloudplease.com/blog/exploring-amazon-vpc-lattice

#aws
πŸ”₯3
πŸ”Ά Containing Compromised EC2 Credentials Without (Hopefully) Breaking Things

There are multiple techniques for containing compromised instance credentials. The easy ones are the most likely to break things, but there are creative options to lock out attackers without breaking applications.

https://www.firemon.com/containing-compromised-ec2-credentials-without-hopefully-breaking-things

#aws
πŸ”₯2
πŸ”Ά Two Minor Cross-Tenant Vulnerabilities in AWS App Runner

These vulnerabilities leaked configuration information across tenant boundaries. While they are both minor issues, they further demonstrate that undocumented AWS APIs have lacked the scrutiny of AWS as well as the cloud security community.

https://frichetten.com/blog/minor-cross-tenant-vulns-app-runner

#aws
πŸ”₯3
πŸ”΄ How to secure digital assets with multi-party computation and Confidential Space

To help customers use multi-party computation and Confidential Space, GCP described a reference architecture for implementing MPC-compliant blockchain signing.

https://cloud.google.com/blog/products/identity-security/how-to-secure-digital-assets-with-multi-party-computation-and-confidential-space

#gcp
πŸ”₯3
πŸ”Ά Automate IAM credential reports for large AWS Organizations

How to manage credentials with many accounts, automate IAM credential reports, and consolidate the results.

https://aws.amazon.com/blogs/infrastructure-and-automation/automate-iam-credential-reports-for-large-aws-organizations

#aws
πŸ”₯3
πŸ”· From listKeys to Glory: How We Achieved a Subscription Privilege Escalation and RCE by Abusing Azure Storage Account Keys

How the Orca Security team discovered a critical exploitation path, utilizing Microsoft Azure shared key authorization, and provide key mitigation steps.

https://orca.security/resources/blog/azure-shared-key-authorization-exploitation

#azure
πŸ”₯1🀩1
πŸ”Ά The Unholy Marriage of AWS IAM Roles and Instance Profiles

Post explaining IAM Roles and Instance Profiles, how to create and manage them, and attach them to EC2 instances to grant permissions to access AWS services while adhering to security best practices.

https://www.uptycs.com/blog/aws-iam-roles-instance-profiles

#aws
πŸ‘4πŸ”₯2🀩1
πŸ”· Building a secure Azure reference architecture with Terraform

A reference architecture including several components, such as a virtual network, a bastion host, a load balancer, and a cluster of virtual machines running a web application.

https://www.hashicorp.com/blog/building-a-secure-azure-reference-architecture-with-terraform

#azure
πŸ”₯4πŸ‘1πŸ‘1
πŸ”Ά Privilege escalation in AWS Elastic Kubernetes Service

An interesting privilege escalation scenario in Kubernetes (EKS) involving NodeRestriction.

https://blog.calif.io/p/privilege-escalation-in-eks

#aws
πŸ”₯5
πŸ”΄ How to identify and reduce costs of your Google Cloud observability in Cloud Monitoring

A cost savings guide for Cloud Monitoring.

https://cloud.google.com/blog/products/management-tools/learn-to-understand-and-reduce-cloud-monitoring-costs

#gcp
πŸ”₯1
πŸ”· Hacking Your Cloud: Tokens Edition 2.0

Techniques attackers might use to exploit cloud tokens and gain access to resources. Strong token management, limiting privileges, and token revocation policies help mitigate risks.

https://www.trustedsec.com/blog/hacking-your-cloud-tokens-edition-2-0

#azure
πŸ”₯3πŸ‘2
πŸ”Ά New Phone, Who Dis? How Cloud Environments Are Exploited for Smishing Campaigns

Commodity threat actors have recently begun to exploit cloud environments for smishing campaigns, employing techniques strikingly similar to those used in SES enumeration and abuse.

https://permiso.io/blog/s/smishing-attack-on-aws-sms-new-phone-who-dis

#aws
πŸ”₯2πŸ‘1πŸ‘1
πŸ”΄ Asset Key Thief security vulnerability technical details

A persistent Service Account private key exfiltration privilege escalation technique that potentially affected Google Cloud Service Accounts, now remediated promptly by the Google Cloud team.

https://engineering.sada.com/asset-key-thief-disclosure-cfae4f1778b6

#gcp
πŸ‘3πŸ”₯3❀1😱1
πŸ”ΆπŸ”·πŸ”΄ Cloud Red Teaming: AWS Initial Access & Privilege Escalation

Slides from a session that covered the latest cloud focused attack vectors and described viable strategies on how to detect their malicious usage within your cloud environments.

https://speakerdeck.com/tweekfawkes/cloud-red-teaming-aws-initial-access-and-privilege-escalation

#aws #azure #gcp
πŸ”₯3πŸ‘1πŸ‘1