CloudSec Wine – Telegram
CloudSec Wine
2.14K subscribers
918 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔴 Safer and Multimodal: Responsible AI with Gemma

ShieldGemma 2 can detect harmful content in AI models' text and image inputs/outputs, built on Gemma 3 for safer AI development.

https://developers.googleblog.com/en/safer-and-multimodal-responsible-ai-with-gemma/

#gcp
1👍1🔥1
🔴 Project Shield makes it easier to sign up, set up, automate DDoS protection

Project Shield employs Google Cloud Armor to defend against DDoS attacks with minimal user configuration.

https://cloud.google.com/blog/products/identity-security/project-shield-makes-it-easier-to-sign-up-set-up-automate-ddos-protection/

#gcp
1👍1🔥1
🔶 Amazon EKS now envelope encrypts all Kubernetes API data by default

EKS enables default envelope encryption for all Kubernetes API data in EKS clusters running Kubernetes version 1.28 or higher.

https://aws.amazon.com/ru/about-aws/whats-new/2025/03/amazon-eks-envelope-encrypts-kubernetes-api-data-default/

(Use VPN to open from Russia)

#aws
👍21🔥1
👩‍💻 Az-Skywalker

Enumerate all secrets in all Azure Key Vaults and Logic Apps across all subnoscriptions.

https://github.com/Az-Skywalker/Az-Skywalker

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
👩‍💻 Understanding Elevate Access mechanism, its implementation, and logs where activities are recorded

This article aims to provide a deeper technical understanding of the Elevate Access mechanism, including its underlying implementation, the specific logs where activities are recorded, when you DON'T need Elevate Access to get the same permissions, and the practical techniques attackers use to leverage it.

https://permiso.io/blog/azures-apex-permissions-elevate-access-the-logs-security-teams-overlook

(Use VPN to open from Russia)

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔶👩‍💻 AWS CloudWatch log ingestion to Microsoft Sentinel

A solution using CloudWatch log subnoscription filters to stream logs to an S3 bucket via Kinesis Firehose.

https://medium.com/@paulschwarzenberger/aws-cloudwatch-log-ingestion-to-microsoft-sentinel-fa5084de41f9

(Use VPN to open from Russia)

#aws #azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔴 Streamlined Security: Introducing Network Security Integration

Network Security Integration can help you integrate third-party network appliance or service deployments with your Google Cloud workloads.

https://cloud.google.com/blog/products/networking/introducing-network-security-integration/

#gcp
👍21🔥1
🔴 Google Cloud - Managing Google's Unverified Authentication Library

In Google Cloud, Application Default Credentials (ADC) allows your code/applications to automatically find and use credentials.

https://akingscote.co.uk/posts/gcloud-unconfigured-third-party-apps/

#gcp
👍21🔥1
👩‍💻 Creating immutable users through a bug in Entra ID restricted administrative units

Imagine trying to disable a malicious user in your Azure environment, only to find it can't be modified! Datadog recently identified a timing-based bug in Entra ID's restricted administrative units (AUs) that could have allowed just this scenario to occur.

https://securitylabs.datadoghq.com/articles/creating-immutable-users-entra-id-administrative-units/

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔶 Interactive AWS NAT Gateway

An interactive blog post exploring how AWS NAT Gateway works.

https://malithr.com/aws/natgateway/

#aws
👍21🔥1
🔴 Introducing protection summary, a new Google Cloud Backup and DR feature

Google Cloud Backup and DR's protection summary offers a centralized view of data protection configuration, identifying gaps and improving resilience.

https://cloud.google.com/blog/products/storage-data-transfer/google-cloud-backup-and-dr-protection-summary/

#gcp
1👍1🔥1
🔶 Effectively implementing resource control policies in a multi-account environment

Post demonstrating how RCPs can help improve your security posture while allowing even more freedom to developers in managing their resources, thus reducing friction between central security and application teams.

https://aws.amazon.com/ru/blogs/security/effectively-implementing-resource-controls-policies-in-a-multi-account-environment/

(Use VPN to open from Russia)

#aws
2👍1🔥1
🔶 How does Sendbird secure AWS?

How Sendbird matured its AWS security posture, empowering developers to deploy in a way that's both user-friendly and secure.

https://sendbird.com/blog/aws-security

#aws
2👍1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
🔴 ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run

The vulnerability could have allowed to abuse Google Cloud Run permissions in order to pull private Google Artifact Registry and Google Container Registry images in the same account.

https://www.tenable.com/blog/imagerunner-a-privilege-escalation-vulnerability-impacting-gcp-cloud-run

(Use VPN to open from Russia)

#gcp
1👍1🔥1
🔶 Invoking Misconfigured API Gateways from Any External AWS Accounts

Did you know a misconfigured private API Gateway can be invoked from any AWS account?

https://www.offensai.com/blog/invoking-misconfigured-api-gateways-from-external-aws-accounts

(Use VPN to open from Russia)

#aws
1👍1🔥1
🔶 Planning for your IAM Roles Anywhere deployment

Before you start using IAM Roles Anywhere, it's important to plan how you'll integrate it with your PKI and with your applications running outside of AWS.

https://aws.amazon.com/ru/blogs/security/planning-for-your-iam-roles-anywhere-deployment/

(Use VPN to open from Russia)

#aws
1👍1🔥1
🔶 Handling Network Throttling with AWS EC2 at Pinterest

Post discussing Pinterest's experiences in identifying the challenges associated with EC2 network throttling, as well as how they developed network performance monitoring for their EC2 fleet.

https://medium.com/@Pinterest_Engineering/handling-network-throttling-with-aws-ec2-at-pinterest-fda0efc21083

(Use VPN to open from Russia)

#aws
👍21🔥1
🔴 Introducing Google Unified Security

Google introduced Unified Security, a new security solution that combines Google Cloud's security products with Mandiant's expertise to provide a comprehensive approach to threat intelligence, security operations, cloud security, and secure enterprise browsing.

https://cloud.google.com/blog/products/identity-security/driving-secure-innovation-with-ai-google-unified-security-next25/

#gcp
1👍1🔥1
🔴 Cloud WAN: Connect your global enterprise with a network built for the AI era

Cloud WAN is a fully managed, reliable, and secure enterprise backbone to transform enterprise wide area network (WAN) architectures.

https://cloud.google.com/blog/products/networking/connect-globally-with-cloud-wan-for-the-ai-era/

#gcp
👍21🔥1
🔶 Automating AWS Private CA audit reports and certificate expiration alerts

Guide through a custom automation workflow that harnesses AWS Private CA audit reports to monitor certificate expirations proactively.

https://aws.amazon.com/ru/blogs/security/automating-aws-private-ca-audit-reports-and-certificate-expiration-alerts/

(Use VPN to open from Russia)

#aws
1👍1🔥1
🔶 How to use the new CloudTrail network activity events for AWS VPC Endpoints

How AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.

https://www.wiz.io/blog/aws-vpc-endpoint-cloudtrail

#aws
1👍1🔥1