๐ท Microsoft Incident Response lessons on preventing cloud identity compromise
Different scenarios involving misconfigured hybrid identity setups that could lead to compromise of Microsoft Entra ID.
https://www.microsoft.com/en-us/security/blog/2023/12/05/microsoft-incident-response-lessons-on-preventing-cloud-identity-compromise/
#azure
Different scenarios involving misconfigured hybrid identity setups that could lead to compromise of Microsoft Entra ID.
https://www.microsoft.com/en-us/security/blog/2023/12/05/microsoft-incident-response-lessons-on-preventing-cloud-identity-compromise/
#azure
๐3โค1๐ฅ1
๐ด DevSecOps and CI/CD using Google Cloud Built-in Services
How to build a secure CI/CD pipeline using Google Cloud's built-in services using Cloud Build, Cloud Deploy, Artifact Registry, Binary Authorization and GKE.
https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services
#gcp
How to build a secure CI/CD pipeline using Google Cloud's built-in services using Cloud Build, Cloud Deploy, Artifact Registry, Binary Authorization and GKE.
https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services
#gcp
๐ฅ4โค2๐1
๐ถ Zonal autoshift - Automatically shift your traffic away from Availability Zones when we detect potential issues
A new capability of Route 53 Application Recovery Controller that you can enable to automatically and safely shift your workload's traffic away from an Availability Zone when AWS identifies a potential failure affecting that Availability Zone and shift it back once the failure is resolved.
https://aws.amazon.com/ru/blogs/aws/zonal-autoshift-automatically-shift-your-traffic-away-from-availability-zones-when-we-detect-potential-issues/
#aws
A new capability of Route 53 Application Recovery Controller that you can enable to automatically and safely shift your workload's traffic away from an Availability Zone when AWS identifies a potential failure affecting that Availability Zone and shift it back once the failure is resolved.
https://aws.amazon.com/ru/blogs/aws/zonal-autoshift-automatically-shift-your-traffic-away-from-availability-zones-when-we-detect-potential-issues/
#aws
๐3โค1๐ฅ1
๐ด Unauthenticated Access to GCP Dataproc Can Lead to Data Leak
A lack of security controls of the underlying Open Source Software (OSS) managed solution allows an attacker with knowledge of the Dataproc IP address to access it without any authentication.
https://orca.security/resources/blog/unauthenticated-access-to-google-cloud-dataproc/
#gcp
A lack of security controls of the underlying Open Source Software (OSS) managed solution allows an attacker with knowledge of the Dataproc IP address to access it without any authentication.
https://orca.security/resources/blog/unauthenticated-access-to-google-cloud-dataproc/
#gcp
๐3โค1๐ฅ1
๐ถ Cloud services as exfiltration mechanisms
This article outlines how as an adversary you can use an AWS service to exfiltrate data.
https://airwalkreply.com/cloud-services-as-exfiltration-mechanisms
#aws
This article outlines how as an adversary you can use an AWS service to exfiltrate data.
https://airwalkreply.com/cloud-services-as-exfiltration-mechanisms
#aws
๐3โค1๐ฅ1
๐ถ AWS Security Services Best Practices
Best practices for configuring AWS security services. From the AWS team.
https://aws.github.io/aws-security-services-best-practices/
#aws
Best practices for configuring AWS security services. From the AWS team.
https://aws.github.io/aws-security-services-best-practices/
#aws
โค6๐ฅ2๐1
๐ถ๐ท๐ด Introducing CloudSecGPT: Your Go-To AI for Cloud Security Insights
CloudSecGPT is a custom-built generative AI model that specializes in cloud security.
https://blog.marcolancini.it/2023/blog-cloudsecgpt/
(Use VPN to open from Russia)
#aws #azure #gcp
CloudSecGPT is a custom-built generative AI model that specializes in cloud security.
https://blog.marcolancini.it/2023/blog-cloudsecgpt/
(Use VPN to open from Russia)
#aws #azure #gcp
๐ฅ3โค1๐1
๐ถ Quick Tip: Minimizing Terraformed SCPs
How to tackle character limits in SCPs.
https://ramimac.me/terraform-minimized-scps
#aws
How to tackle character limits in SCPs.
https://ramimac.me/terraform-minimized-scps
#aws
๐3โค1๐ฅ1
๐ท Securing AD CS: Microsoft Defender for Identity's Sensor Unveiled
Active Directory Certificate Services (AD CS) is commonly used in Active Directory environments to manage Public Key Infrastructure (PKI) and it plays a critical role in instrumenting digital certificates.
https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/securing-ad-cs-microsoft-defender-for-identity-s-sensor-unveiled/ba-p/3980265
#azure
Active Directory Certificate Services (AD CS) is commonly used in Active Directory environments to manage Public Key Infrastructure (PKI) and it plays a critical role in instrumenting digital certificates.
https://techcommunity.microsoft.com/t5/microsoft-defender-xdr-blog/securing-ad-cs-microsoft-defender-for-identity-s-sensor-unveiled/ba-p/3980265
#azure
๐3๐ฅ2๐1
๐ถ Governance at scale: Enforce permissions and compliance by using policy as code
How to automate Config and Control Tower checks.
https://aws.amazon.com/ru/blogs/security/governance-at-scale-enforce-permissions-and-compliance-by-using-policy-as-code/
#aws
How to automate Config and Control Tower checks.
https://aws.amazon.com/ru/blogs/security/governance-at-scale-enforce-permissions-and-compliance-by-using-policy-as-code/
#aws
๐ฅ4๐1๐1
๐ด Migrate from service account keys
An article that describes the process for migrating from service account keys to more secure authentication methods.
https://cloud.google.com/iam/docs/migrate-from-service-account-keys
#gcp
An article that describes the process for migrating from service account keys to more secure authentication methods.
https://cloud.google.com/iam/docs/migrate-from-service-account-keys
#gcp
๐3โค1๐ฅ1
๐ด Introducing Cloud SQL IAM group authentication
New IAM groups authentication in Cloud SQL simplifies granting/revoking access to database objects at scale.
https://cloud.google.com/blog/products/databases/introducing-cloud-sql-iam-group-authentication/
#gcp
New IAM groups authentication in Cloud SQL simplifies granting/revoking access to database objects at scale.
https://cloud.google.com/blog/products/databases/introducing-cloud-sql-iam-group-authentication/
#gcp
๐3โค1๐ฅ1
๐ถ AWSAttacks
This repo contains IOC, malware and malware analysis associated with AWS cloud. You can also refer to this blog post.
https://github.com/unknownhad/AWSAttacks
#aws
This repo contains IOC, malware and malware analysis associated with AWS cloud. You can also refer to this blog post.
https://github.com/unknownhad/AWSAttacks
#aws
๐4๐ฅ2โค1
๐ Dear friends,
Happy New Year 2024! ๐
This year has been good. The next one will be even better. We wish everyone personal and career success. Stay with us, we will delight you only with high-quality content.
#HappyNewYear
Happy New Year 2024! ๐
This year has been good. The next one will be even better. We wish everyone personal and career success. Stay with us, we will delight you only with high-quality content.
#HappyNewYear
โค4๐4๐ฅ1
๐ด Why did 1 GitHub Repo leak 5,000 Live GCP Keys?
More GCP Keys leaked on GitHub in 2022 than any other key type. Why? Turns out one repository played a major role.
https://trufflesecurity.com/blog/why-did-1-github-repo-leak-5000-live-gcp-keys/
#gcp
More GCP Keys leaked on GitHub in 2022 than any other key type. Why? Turns out one repository played a major role.
https://trufflesecurity.com/blog/why-did-1-github-repo-leak-5000-live-gcp-keys/
#gcp
๐4โค1๐ฅ1
๐ถ Deep dive into the new Amazon EKS Cluster Access Management features
Post deep diving into the newly released Amazon EKS cluster access management features, as well as discussing threat detection opportunities based on the newly available CloudTrail events associated with this feature.
https://securitylabs.datadoghq.com/articles/eks-cluster-access-management-deep-dive/
#aws
Post deep diving into the newly released Amazon EKS cluster access management features, as well as discussing threat detection opportunities based on the newly available CloudTrail events associated with this feature.
https://securitylabs.datadoghq.com/articles/eks-cluster-access-management-deep-dive/
#aws
๐5๐ฅ2โค1
๐ด Exploiting Monitoring and Service Mesh Configurations in GKE to Gain Unauthorized Access
The article exposes a privilege escalation vulnerability in Google Kubernetes Engine, involving misuse of FluentBit and Anthos Service Mesh, allowing attackers to gain full cluster control.
https://unit42.paloaltonetworks.com/google-kubernetes-engine-privilege-escalation-fluentbit-anthos/
#gcp
The article exposes a privilege escalation vulnerability in Google Kubernetes Engine, involving misuse of FluentBit and Anthos Service Mesh, allowing attackers to gain full cluster control.
https://unit42.paloaltonetworks.com/google-kubernetes-engine-privilege-escalation-fluentbit-anthos/
#gcp
๐5โค3๐ฅ2
๐ถ Setting secure AWS defaults and avoiding misconfigurations
Wiz cloud security researcher, Scott Piper, suggests measures organizations can adopt to ensure secure defaults on AWS and improve their security posture.
https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws
#aws
Wiz cloud security researcher, Scott Piper, suggests measures organizations can adopt to ensure secure defaults on AWS and improve their security posture.
https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws
#aws
๐5โค1๐ฅ1
๐ถ Best Practices to help secure your container image build pipeline by using AWS Signer
AWS Signer is a fully managed code-signing service to help ensure the trust and integrity of your code. It helps you verify that the code comes from a trusted source and that an unauthorized party has not accessed it.
https://aws.amazon.com/ru/blogs/security/best-practices-to-help-secure-your-container-image-build-pipeline-by-using-aws-signer/
#aws
AWS Signer is a fully managed code-signing service to help ensure the trust and integrity of your code. It helps you verify that the code comes from a trusted source and that an unauthorized party has not accessed it.
https://aws.amazon.com/ru/blogs/security/best-practices-to-help-secure-your-container-image-build-pipeline-by-using-aws-signer/
#aws
๐4โค1๐ฅ1
๐ถ Deep dive into AWS CloudShell
AWS CloudShell got a new capability in January 2024: running Docker containers.
https://awsteele.com/blog/2024/01/11/deep-dive-into-aws-cloudshell.html
#aws
AWS CloudShell got a new capability in January 2024: running Docker containers.
https://awsteele.com/blog/2024/01/11/deep-dive-into-aws-cloudshell.html
#aws
๐ฅ5โค1๐1