CloudSec Wine
2.19K subscribers
973 photos
19 files
1.31K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
๐Ÿ”ท Azure AD is Becoming Microsoft Entra ID

Microsoft is rebranding Azure AD to Microsoft Entra ID.

https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/azure-ad-is-becoming-microsoft-entra-id/ba-p/2520436

#azure
๐Ÿ‘2๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ”ถ How to Monitor AWS IAM Root Users at Scale: Best Practices

CloudYali provides insights into best practices and effective strategies for managing IAM users at scale. The article delves into IAM user monitoring, emphasising the importance of the root user, and highlighting essential IAM security practices. It also covers automation of IAM Credential Report generation at scale, streamlining the collection of IAM user information and facilitating more efficient monitoring and management for cloud teams.

https://www.cloudyali.io/blogs/how-to-monitor-aws-iam-root-users-at-scale-best-practices?utm_source=tldrsec.com&utm_medium=referral&utm_campaign=tl-dr-sec-191-badzure-detection-response-pipelines-18k-subscribers

#aws
๐Ÿ‘2๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ”ด Bad.Build: PE & RCE Vulnerabilities in Google Cloud Build

The Orca Research Pod discovered Bad.Build, a vulnerability in the Google Cloud Build service that enables attackers to escalate privileges and gain unauthorized access to code repositories and images in Artifact Registry.

https://orca.security/resources/blog/bad-build-google-cloud-build-potential-supply-chain-attack-vulnerability/

#gcp
๐Ÿ‘3๐Ÿ‘Ž1๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ”ถ Abusing Amazon VPC CNI plugin for Kubernetes

The article discusses a security vulnerability in the Amazon VPC CNI plugin, used by Amazon EKS. The flaw allows an attacker to move laterally to other VPCs in the AWS account.

https://www.elttam.com/blog/amazon-vpc-cni/

#aws
๐Ÿ‘2โค1๐Ÿ”ฅ1
๐Ÿ”ถ Orca Security's journey to a petabyte-scale data lake with Apache Iceberg and AWS Analytics

Orca Security shares their experience in building a petabyte-scale data lake using Apache Iceberg and AWS services.

https://aws.amazon.com/ru/blogs/big-data/orca-securitys-journey-to-a-petabyte-scale-data-lake-with-apache-iceberg-and-aws-analytics/

#aws
๐Ÿ‘3๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ”ถ How to get rid of AWS access keys - Part 3: Replacing the authentication

Post discussing alternative solutions to using access keys.

https://www.wiz.io/blog/how-to-get-rid-of-aws-access-keys-part-3

#aws
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ถ Refuting AWS Chain Attack - Digging Deeper into EKS Zero Day claims

An analysis of the findings published by a security researcher last month, claiming to have uncovered zero days in thousands of EKS cluster.

https://kloudle.com/blog/refuting-aws-chain-attack-digging-deeper-into-eks-zero-days-claim/

#aws
๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ”ถ No keys attached: Exploring GitHub-to-AWS keyless authentication flaws

While popular, GitHub-to-AWS keyless authentication mechanisms can be insecurely configured.

https://securitylabs.datadoghq.com/articles/exploring-github-to-aws-keyless-authentication-flaws/

#aws
๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ”ถ Swiping right on the AWS WAF CAPTCHA challenge

Post walking through a methodology for beating the AWS WAF CAPTCHA challenges programmatically.

https://onecloudplease.com/blog/swiping-right-on-the-aws-waf-captcha-challenge

#aws
๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ”ถ๐Ÿ”ท๐Ÿ”ด Hijacking Cloud CI/CD Systems for Fun and Profit

This research details a new technique that can be used by threat actors for supply chain attacks on open-source repositories using GCP, Azure and AWS.

https://divyanshu-mehta.gitbook.io/researchs/hijacking-cloud-ci-cd-systems-for-fun-and-profit

#aws #azure #gcp
๐Ÿ”ฅ3โค1๐Ÿ‘1๐Ÿ‘1
๐Ÿ”ถAWS Networking Concepts

A mind map to link together all the different networking-related concepts from AWS.

https://miparnisariblog.wordpress.com/2023/03/29/aws-networking-concepts/

#aws
๐Ÿ‘4๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ”ถ Automated First-Response in AWS using Sigma and Athena

Can Sigma rules provide first-response capabilities in a post-compromised AWS environment?

https://invictus-ir.medium.com/automated-first-response-in-aws-using-sigma-and-athena-615940bedc56

(Use VPN to open from Russia)

#aws
๐Ÿ‘4๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ”ท Microsoft Entra Workload ID - Introduction and Delegated Permissions

Post providing an overview about some aspects and features which are important in delegating management of Workload ID in Microsoft Entra: Who can see and create apps? Why you should avoid assigning owners to service principals or application objects?

https://www.cloud-architekt.net/entra-workload-id-introduction-and-delegation

#azure
๐Ÿ‘4๐Ÿ”ฅ1๐Ÿ˜ฑ1
๐Ÿ”ถ More on Abusing the Amazon Web Services SSM Agent as a Remote Access Trojan

This blog lays out a new potential post-exploitation technique: Abusing AWS Systems Manager (SSM) agent so that it functions as a Remote Access Trojan (RAT) on both Linux and Windows machines, while using an attacker AWS account as a Command and Control (C&C).

https://www.mitiga.io/blog/abusing-the-amazon-web-services-ssm-agent-as-a-remote-access-trojan

#aws
๐Ÿ‘3๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ”ด Signing URLs in GCP: Convenience vs. Security

Why the "iam.serviceAccounts.signBlob" permission can cause trouble in your GCP environment.

https://lsgeurope.com/post/signing-urls-in-gcp-convenience-vs-security

#gcp
๐Ÿ‘3๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ”ถ Perform continuous vulnerability scanning of AWS Lambda functions with Amazon Inspector

Activate Amazon Inspector within one or more AWS accounts, and be notified when a vulnerability is detected in an AWS Lambda function.

https://aws.amazon.com/ru/blogs/security/perform-continuous-vulnerability-scanning-of-aws-lambda-functions-with-amazon-inspector/

#aws
๐Ÿ‘4๐Ÿ”ฅ2โค1
๐Ÿ”ถ Configure fine-grained access to your resources shared using AWS Resource Access Manager

You can use AWS Resource Access Manager (AWS RAM) to securely, simply, and consistently share supported resource types within your organization or organizational units (OUs) and across AWS accounts.

https://aws.amazon.com/ru/blogs/security/configure-fine-grained-access-to-your-resources-shared-using-aws-resource-access-manager/

#aws
๐Ÿ‘3โค1๐Ÿ”ฅ1
๐Ÿ”ท Unauthorized Access to Cross-Tenant Applications in Microsoft Power Platform

A researcher at Tenable has discovered an issue that enables limited, unauthorized access to cross-tenant applications and sensitive data (including but not limited to authentication secrets).

https://www.tenable.com/security/research/tra-2023-25

(Use VPN to open from Russia)

#azure
โค1๐Ÿ‘1๐Ÿ”ฅ1
๐Ÿ”ท Knocking on the Front Door (client side desync attack on Azure CDN)

A write-up on a Browser-Powered Desync bug discovered in the Azure CDN service known as Front Door.

https://blog.jeti.pw/posts/knocking-on-the-front-door

#azure
๐Ÿ‘1๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ”ถ Hacking Github AWS integrations again

Another post looking at the perils of unproperly scoping access provided by OIDC.

https://dagrz.com/writing/aws-security/hacking-github-aws-oidc

#aws
๐Ÿ”ฅ2โค1๐Ÿ‘1