CloudSec Wine
2.19K subscribers
973 photos
19 files
1.31K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
๐Ÿ”ถ Reversing AWS IAM unique IDs

How to identify the ARN of a user/role from AWS IAM unique IDs, often seen in CloudTrail logs.

https://awsteele.com/blog/2023/11/19/reversing-aws-iam-unique-ids.html

#aws
๐Ÿ‘5โค1๐Ÿ”ฅ1
๐Ÿ”ถ Establishing a data perimeter on AWS: Require services to be created only within expected networks

How to use preventative controls to help ensure that your resources are deployed within your VPC, so that you can effectively enforce the network perimeter controls.

https://aws.amazon.com/ru/blogs/security/establishing-a-data-perimeter-on-aws-require-services-to-be-created-only-within-expected-networks/

#aws
๐Ÿ‘4๐Ÿ”ฅ2โค1
๐Ÿ”ด Enhancing Cybersecurity with Security Command Center's Attack Path Simulations and Attack Exposure Scoring

Security Command Center (SCC) recently introduced two new features: Attack Path Simulation (APS) and Attack Exposure Scoring (AES).

https://medium.com/google-cloud/enhancing-cybersecurity-with-security-command-centers-attack-path-simulation-and-attack-path-46c527cd4927

(Use VPN to open from Russia)

#gcp
๐Ÿ‘5โค1๐Ÿ”ฅ1
๐Ÿ”ถ How to use multiple instances of AWS IAM Identity Center

You can now have two types of IAM Identity Center instances: organization instances and account instances.

https://aws.amazon.com/ru/blogs/security/how-to-use-multiple-instances-of-aws-iam-identity-center/

#aws
๐Ÿ‘4๐Ÿ”ฅ2โค1
๐Ÿ”ท All the Small Things: Azure CLI Leakage and Problematic Usage Patterns

Post discussing the unintentional leakage of Azure Application Variables in GitHub build logs due to Azure CLI's default behavior.

https://www.paloaltonetworks.com/blog/prisma-cloud/secrets-leakage-user-error-azure-cli/

#azure
๐Ÿ‘2๐Ÿ”ฅ1๐Ÿ˜ฑ1
๐Ÿ”ถ Preventing Accidental Internet-Exposure of AWS Resources

Many AWS customers have suffered breaches due to exposing resources to the Internet by accident. This three-part series walks through different ways to mitigate that risk.

https://kevinhock.github.io/2023/11/26/preventing-accidental-internet-exposure-of-aws-resources-part-1-vpc.html

#aws
๐Ÿ‘4โค1๐Ÿ”ฅ1
๐Ÿ”ด Pwning Cloud Contexts, The Endgame

Slides from a Black Hat MEA 2023 talk discussing how a GitHub token led to the compromise of an entire GCP organization.

https://docs.google.com/presentation/d/1sVZohEgGKDkgwgVNzquNzSzKdLDMOFgAiiR78kcgBAw/edit#slide=id.g29a3b4d3924_0_137

#gcp
๐Ÿ‘2๐Ÿ”ฅ2โค1
๐Ÿ”ถ Deep dive into the new Amazon EKS Pod Identity feature

Earlier this week, AWS released a new feature, EKS Pod Identity, that aims to simplify granting AWS access to pods running in an EKS cluster. This post deep-dives into how this feature works, some elements that make it unique, and why you might consider using it.

https://securitylabs.datadoghq.com/articles/eks-pod-identity-deep-dive/

#aws
๐Ÿ‘7๐Ÿ”ฅ2๐Ÿ˜ฑ1
๐Ÿ”ถ How fast is CloudTrail today? Investigating CloudTrail delays using Athena

Investigating how long CloudTrail takes to deliver events in 2023.

https://tracebit.com/blog/2023/11/how-fast-is-cloudtrail-today-investigating-cloudtrail-delays-using-athena/

#aws
๐Ÿ‘3๐Ÿ”ฅ1๐Ÿ˜ฑ1
๐Ÿ”ถ Avoid accidental exposure of authenticated Amazon API Gateway resources

The article advises securing Amazon API Gateway by setting default authorizers and applying resource policies for IAM authentication, to prevent accidental exposure and enhance security through defense in depth.

https://www.wolfe.id.au/2023/11/12/avoid-accidental-exposure-of-authenticated-amazon-api-gateway-resources/

#aws
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ด Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature

A security risk discovered in the Google Cloud Platform domain-wide delegation feature allows a user to generate an access token to Google Workspace, granting unauthorized access to data and other key tools.

https://unit42.paloaltonetworks.com/critical-risk-in-google-workspace-delegation-feature/

#gcp
๐Ÿ‘3๐Ÿ”ฅ1๐Ÿ˜ฑ1
๐Ÿ”ท Microsoft Incident Response lessons on preventing cloud identity compromise

Different scenarios involving misconfigured hybrid identity setups that could lead to compromise of Microsoft Entra ID.

https://www.microsoft.com/en-us/security/blog/2023/12/05/microsoft-incident-response-lessons-on-preventing-cloud-identity-compromise/

#azure
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ด DevSecOps and CI/CD using Google Cloud Built-in Services

How to build a secure CI/CD pipeline using Google Cloud's built-in services using Cloud Build, Cloud Deploy, Artifact Registry, Binary Authorization and GKE.

https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services

#gcp
๐Ÿ”ฅ4โค2๐Ÿ‘1
๐Ÿ”ถ Zonal autoshift - Automatically shift your traffic away from Availability Zones when we detect potential issues

A new capability of Route 53 Application Recovery Controller that you can enable to automatically and safely shift your workload's traffic away from an Availability Zone when AWS identifies a potential failure affecting that Availability Zone and shift it back once the failure is resolved.

https://aws.amazon.com/ru/blogs/aws/zonal-autoshift-automatically-shift-your-traffic-away-from-availability-zones-when-we-detect-potential-issues/

#aws
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ด Unauthenticated Access to GCP Dataproc Can Lead to Data Leak

A lack of security controls of the underlying Open Source Software (OSS) managed solution allows an attacker with knowledge of the Dataproc IP address to access it without any authentication.

https://orca.security/resources/blog/unauthenticated-access-to-google-cloud-dataproc/

#gcp
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ถ Cloud services as exfiltration mechanisms

This article outlines how as an adversary you can use an AWS service to exfiltrate data.

https://airwalkreply.com/cloud-services-as-exfiltration-mechanisms

#aws
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ถ AWS Security Services Best Practices

Best practices for configuring AWS security services. From the AWS team.

https://aws.github.io/aws-security-services-best-practices/

#aws
โค6๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ”ถ๐Ÿ”ท๐Ÿ”ด Introducing CloudSecGPT: Your Go-To AI for Cloud Security Insights

CloudSecGPT is a custom-built generative AI model that specializes in cloud security.

https://blog.marcolancini.it/2023/blog-cloudsecgpt/

(Use VPN to open from Russia)

#aws #azure #gcp
๐Ÿ”ฅ3โค1๐Ÿ‘1
๐Ÿ”ถ Quick Tip: Minimizing Terraformed SCPs

How to tackle character limits in SCPs.

https://ramimac.me/terraform-minimized-scps

#aws
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ท Securing AD CS: Microsoft Defender for Identity's Sensor Unveiled

Active Directory Certificate Services (AD CS) is commonly used in Active Directory environments to manage Public Key Infrastructure (PKI) and it plays a critical role in instrumenting digital certificates.

https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/securing-ad-cs-microsoft-defender-for-identity-s-sensor-unveiled/ba-p/3980265

#azure
๐Ÿ‘3๐Ÿ”ฅ2๐Ÿ‘1