CloudSec Wine
2.19K subscribers
972 photos
19 files
1.31K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
πŸ”Ά Deploy AWS WAF faster with Security Automations

You can now deploy AWS WAF managed rules as part of the Security Automations for AWS WAF solution.

https://aws.amazon.com/ru/blogs/security/deploy-aws-managed-rules-using-security-automations-for-aws-waf/

#aws
πŸ‘5❀1πŸ”₯1😱1
πŸ”Ά terraform-aws-api-gateway

Terraform module to create Route53 resource on AWS for create api gateway with its basic elements.

https://github.com/clouddrove/terraform-aws-api-gateway

#aws
πŸ‘2❀1πŸ”₯1
πŸ”· Defending new vectors: Threat actors attempt SQL Server to cloud lateral movement

Microsoft's analysis of an attempt to steal the cloud identity in a SQL Server instance for lateral movement highlights the importance of securing cloud identities and implementing least privilege practices when deploying cloud-based and on-premises solutions.

https://www.microsoft.com/en-us/security/blog/2023/10/03/defending-new-vectors-threat-actors-attempt-sql-server-to-cloud-lateral-movement/

#azure
πŸ‘3❀1πŸ”₯1
πŸ”Ά Introduction to AWS Attribute-Based Access Control

The article provides an introduction to Attribute-Based Access Control (ABAC) in AWS. It explains how ABAC differs from traditional Role-Based Access Control (RBAC) and how to use tags to implement ABAC.

https://research.nccgroup.com/2023/10/02/introduction-to-aws-attribute-based-access-control/

#aws
πŸ‘3πŸ”₯2❀1
πŸ”Ά 5 things you may not know about AWS IAM

SCPs are not inherited like you would expect them to be, resource policies can give permissions by themselves, NotPrincipal evaluation may not do what you expect, a permission can be granted by a combination of statements, KMS grants are like detached resource policy statements.

https://blog.revolve.team/2023/09/21/5-things-about-aws-iam/

#aws
πŸ‘3πŸ”₯2❀1
πŸ”Ά Security Hub gives me imposter syndrome

Chris Farris' take on AWS Security Hub, what's wrong, what's good, and why it's a dangerous service for smaller companies.

https://www.chrisfarris.com/post/securityhub-2023/

#aws
πŸ‘3❀1πŸ”₯1
πŸ”Ά Meeting the FedRAMP FIPS 140-2 requirement on AWS

Some ideas for implementing encryption that uses FIPS modules on AWS.

https://alsmola.medium.com/meeting-the-fedramp-fips-140-2-requirement-on-aws-e9886ba3f66b

(Use VPN to open from Russia)

#aws
πŸ‘3❀1πŸ”₯1
πŸ”Ά Following attackers' (Cloud)trail in AWS: Methodology and findings in the wild

Datadog's methodology to proactively identify malicious activity by investigating logs in AWS Cloudtrail.

https://securitylabs.datadoghq.com/articles/following-attackers-trail-in-aws-methodology-findings-in-the-wild/

#aws
πŸ‘4πŸ”₯2❀1
πŸ”Ά Attacking AWS Cognito with Pacu

Common problems in AWS Cognito security, as seen in client environments, which would benefit from automated scanning and exploitation.

https://rhinosecuritylabs.com/aws/attacking-aws-cognito-with-pacu-p1/

#aws
πŸ”₯5❀1πŸ‘1
πŸ”΄ Investigate Service Account Key Origins and Usage with Best Practices

Deep dive on investigating service account key origins and usage, including analyzing authentication patterns, monitoring authentication events, and examining service account impersonation and key usage.

https://p0.dev/blog/service-account-key-origins

#gcp
πŸ‘4❀1πŸ”₯1
πŸ”· Phishing for Primary Refresh Tokens and Windows Hello keys

Post describing new techniques to phish for Primary Refresh Tokens, and in some scenarios also deploy passwordless credentials that comply with even the strictest MFA policies.

https://dirkjanm.io/phishing-for-microsoft-entra-primary-refresh-tokens/

#azure
😱4πŸ”₯2πŸ‘1
πŸ”Ά Users of Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack

Throughout September 2023, an attacker executed a targeted campaign via Pypi to draw developers using Alibaba cloud services, AWS, and Telegram to their malicious packages.

https://checkmarx.com/blog/users-of-telegram-aws-and-alibaba-cloud-targeted-in-latest-supply-chain-attack/

#aws
πŸ”₯5❀1πŸ‘1
πŸ”Ά What Can Go Wrong When an EC2 Instance is Exposed to SSRF

New CNAPPgoat scenario makes experimentation easy by triggering calls to AWS service from an EC2 instance exposed to SSRF.

https://ermetic.com/blog/cloud/exfiltrated-signed-delivered-what-can-go-wrong-when-an-amazon-elastic-compute-cloud-ec2-instance-is-exposed-to-ssrf/

#aws
πŸ‘3πŸ”₯2❀1
πŸ”Ά Adopt Open ID Connect (OIDC) in Terraform for secure multi-account CI/CD to AWS

Deploy to AWS with Terraform and GitHub Actions using Open ID Connect (OIDC) and IAM AssumeRoleWithWebIdentity. Say goodbye to IAM users and long-lived credentials.

https://hedrange.com/2023/10/07/adopt-open-id-connect-oidc-in-terraform-for-secure-multi-account-ci-cd-to-aws/

#aws
πŸ‘4πŸ”₯2❀1
πŸ”· Everything you need to know about the Microsoft Graph Activity Logs

An introduction on the new Graph APIs that can help incident responders close some visibility gaps.

https://invictus-ir.medium.com/everything-you-need-to-know-about-the-microsoftgraphactivitylogs-5bd7c158dc1c

(Use VPN to open from Russia)

#azure
πŸ‘3πŸ”₯1😱1
πŸ”Ά Terraform AWS Provider: Everything you need to know about Multi-Account Authentication and Configuration

Post covering multiple options available to configure the authentication between Terraform and AWS.

https://hector-reyesaleman.medium.com/terraform-aws-provider-everything-you-need-to-know-about-multi-account-authentication-and-f2343a4afd4b

(Use VPN to open from Russia)

#aws
πŸ‘4❀1πŸ”₯1
πŸ”΄ Cloud CISO Perspectives: How boards can help cyber-crisis communications

Google Cloud CISO Phil Venables talks about the important (and often undervalued) organizational skill of crisis communications.

https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-boards-can-help-cyber-crisis-communications/

#gcp
πŸ‘3❀1πŸ”₯1
πŸ”· Exploring the Dark Side of Package Files and Storage Account Abuse

How attackers can abuse the Storage Account's connection string to gain unauthorized access to the Function Apps.

https://3xpl01tc0d3r.blogspot.com/2023/10/exploring-dark-side-of-package-files.html

#azure
πŸ‘3❀1πŸ”₯1
πŸ”Ά Securing attacks targeted at user or kernel level for customer X with KubeArmor & AWS Bottlerock

The article outlines how KubeArmor and AWS Bottlerocket enhance security in Kubernetes deployments. KubeArmor aids in blocking unwanted binaries and applying granular controls at the container level, while AWS Bottlerocket fortifies host and worker nodes.

https://www.cncf.io/blog/2023/10/26/securing-attacks-targeted-at-user-or-kernel-level-for-customer-x-with-kubearmor-aws-bottlerocket/

#aws
πŸ‘3πŸ”₯2❀1
πŸ”Ά Fargate and Cribl (Stream): How We Got It Working

The article discusses deploying Cribl using AWS Fargate to manage log data more effectively, outlining an approach to setting up this infrastructure.

https://floqast.com/engineering-blog/post/fargate-and-cribl-stream-how-we-got-it-working/

#aws
πŸ‘3❀1πŸ”₯1