CloudSec Wine
2.19K subscribers
973 photos
19 files
1.31K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
πŸ”Ά How fast is CloudTrail today? Investigating CloudTrail delays using Athena

Investigating how long CloudTrail takes to deliver events in 2023.

https://tracebit.com/blog/2023/11/how-fast-is-cloudtrail-today-investigating-cloudtrail-delays-using-athena/

#aws
πŸ‘3πŸ”₯1😱1
πŸ”Ά Avoid accidental exposure of authenticated Amazon API Gateway resources

The article advises securing Amazon API Gateway by setting default authorizers and applying resource policies for IAM authentication, to prevent accidental exposure and enhance security through defense in depth.

https://www.wolfe.id.au/2023/11/12/avoid-accidental-exposure-of-authenticated-amazon-api-gateway-resources/

#aws
πŸ‘3❀1πŸ”₯1
πŸ”΄ Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature

A security risk discovered in the Google Cloud Platform domain-wide delegation feature allows a user to generate an access token to Google Workspace, granting unauthorized access to data and other key tools.

https://unit42.paloaltonetworks.com/critical-risk-in-google-workspace-delegation-feature/

#gcp
πŸ‘3πŸ”₯1😱1
πŸ”· Microsoft Incident Response lessons on preventing cloud identity compromise

Different scenarios involving misconfigured hybrid identity setups that could lead to compromise of Microsoft Entra ID.

https://www.microsoft.com/en-us/security/blog/2023/12/05/microsoft-incident-response-lessons-on-preventing-cloud-identity-compromise/

#azure
πŸ‘3❀1πŸ”₯1
πŸ”΄ DevSecOps and CI/CD using Google Cloud Built-in Services

How to build a secure CI/CD pipeline using Google Cloud's built-in services using Cloud Build, Cloud Deploy, Artifact Registry, Binary Authorization and GKE.

https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services

#gcp
πŸ”₯4❀2πŸ‘1
πŸ”Ά Zonal autoshift - Automatically shift your traffic away from Availability Zones when we detect potential issues

A new capability of Route 53 Application Recovery Controller that you can enable to automatically and safely shift your workload's traffic away from an Availability Zone when AWS identifies a potential failure affecting that Availability Zone and shift it back once the failure is resolved.

https://aws.amazon.com/ru/blogs/aws/zonal-autoshift-automatically-shift-your-traffic-away-from-availability-zones-when-we-detect-potential-issues/

#aws
πŸ‘3❀1πŸ”₯1
πŸ”΄ Unauthenticated Access to GCP Dataproc Can Lead to Data Leak

A lack of security controls of the underlying Open Source Software (OSS) managed solution allows an attacker with knowledge of the Dataproc IP address to access it without any authentication.

https://orca.security/resources/blog/unauthenticated-access-to-google-cloud-dataproc/

#gcp
πŸ‘3❀1πŸ”₯1
πŸ”Ά Cloud services as exfiltration mechanisms

This article outlines how as an adversary you can use an AWS service to exfiltrate data.

https://airwalkreply.com/cloud-services-as-exfiltration-mechanisms

#aws
πŸ‘3❀1πŸ”₯1
πŸ”Ά AWS Security Services Best Practices

Best practices for configuring AWS security services. From the AWS team.

https://aws.github.io/aws-security-services-best-practices/

#aws
❀6πŸ”₯2πŸ‘1
πŸ”ΆπŸ”·πŸ”΄ Introducing CloudSecGPT: Your Go-To AI for Cloud Security Insights

CloudSecGPT is a custom-built generative AI model that specializes in cloud security.

https://blog.marcolancini.it/2023/blog-cloudsecgpt/

(Use VPN to open from Russia)

#aws #azure #gcp
πŸ”₯3❀1πŸ‘1
πŸ”Ά Quick Tip: Minimizing Terraformed SCPs

How to tackle character limits in SCPs.

https://ramimac.me/terraform-minimized-scps

#aws
πŸ‘3❀1πŸ”₯1
πŸ”· Securing AD CS: Microsoft Defender for Identity's Sensor Unveiled

Active Directory Certificate Services (AD CS) is commonly used in Active Directory environments to manage Public Key Infrastructure (PKI) and it plays a critical role in instrumenting digital certificates.

https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/securing-ad-cs-microsoft-defender-for-identity-s-sensor-unveiled/ba-p/3980265

#azure
πŸ‘3πŸ”₯2πŸ‘1
πŸ”Ά Governance at scale: Enforce permissions and compliance by using policy as code

How to automate Config and Control Tower checks.

https://aws.amazon.com/ru/blogs/security/governance-at-scale-enforce-permissions-and-compliance-by-using-policy-as-code/

#aws
πŸ”₯4πŸ‘1πŸ‘1
πŸ”΄ Migrate from service account keys

An article that describes the process for migrating from service account keys to more secure authentication methods.

https://cloud.google.com/iam/docs/migrate-from-service-account-keys

#gcp
πŸ‘3❀1πŸ”₯1
πŸ”΄ Introducing Cloud SQL IAM group authentication

New IAM groups authentication in Cloud SQL simplifies granting/revoking access to database objects at scale.

https://cloud.google.com/blog/products/databases/introducing-cloud-sql-iam-group-authentication/

#gcp
πŸ‘3❀1πŸ”₯1
πŸ”Ά AWSAttacks

This repo contains IOC, malware and malware analysis associated with AWS cloud. You can also refer to this blog post.

https://github.com/unknownhad/AWSAttacks

#aws
πŸ‘4πŸ”₯2❀1
πŸ™‚ Dear friends,

Happy New Year 2024! πŸŽ…

This year has been good. The next one will be even better. We wish everyone personal and career success. Stay with us, we will delight you only with high-quality content.

#HappyNewYear
❀4πŸ‘4πŸ”₯1
πŸ”΄ Why did 1 GitHub Repo leak 5,000 Live GCP Keys?

More GCP Keys leaked on GitHub in 2022 than any other key type. Why? Turns out one repository played a major role.

https://trufflesecurity.com/blog/why-did-1-github-repo-leak-5000-live-gcp-keys/

#gcp
πŸ‘4❀1πŸ”₯1
πŸ”Ά Deep dive into the new Amazon EKS Cluster Access Management features

Post deep diving into the newly released Amazon EKS cluster access management features, as well as discussing threat detection opportunities based on the newly available CloudTrail events associated with this feature.

https://securitylabs.datadoghq.com/articles/eks-cluster-access-management-deep-dive/

#aws
πŸ‘5πŸ”₯2❀1
πŸ”΄ Exploiting Monitoring and Service Mesh Configurations in GKE to Gain Unauthorized Access

The article exposes a privilege escalation vulnerability in Google Kubernetes Engine, involving misuse of FluentBit and Anthos Service Mesh, allowing attackers to gain full cluster control.

https://unit42.paloaltonetworks.com/google-kubernetes-engine-privilege-escalation-fluentbit-anthos/

#gcp
πŸ‘5❀3πŸ”₯2