🔴 Leaving Bastion Hosts Behind
Post examining GCP services like OS Login and Identity-Aware Proxy (IAP), and showing how they can be used as an alternative to bastion hosts.
https://www.netskope.com/blog/leaving-bastion-hosts-behind-part-1-gcp
#gcp
Post examining GCP services like OS Login and Identity-Aware Proxy (IAP), and showing how they can be used as an alternative to bastion hosts.
https://www.netskope.com/blog/leaving-bastion-hosts-behind-part-1-gcp
#gcp
Netskope
Leaving Bastion Hosts Behind Part 1: GCP
Introduction Any enterprise running virtual machines in the cloud needs to securely manage them, which is commonly done with Remote Desktop Protocol (RDP)
🔶 AWS Condition Context Keys for Reducing Risk
Post taking a closer look at the "aws:CalledVia*" and "aws:ViaAWSService" keys, and how you can use them to achieve least privilege.
https://ermetic.com/whats-new/blog/aws/aws-condition-context-keys-for-reducing-risk
#aws
Post taking a closer look at the "aws:CalledVia*" and "aws:ViaAWSService" keys, and how you can use them to achieve least privilege.
https://ermetic.com/whats-new/blog/aws/aws-condition-context-keys-for-reducing-risk
#aws
Tenable®
Secure cloud exposure with Tenable Cloud Security
Cloud security at Tenable starts with a unified CNAPP powerful enough to manage posture, secure workloads, govern identity & access management, and much more.
🔶 KONTRA's AWS Top 10
A series of free interactive security training modules that teach developers how to identify and mitigate security vulnerabilities in their AWS-hosted cloud applications.
https://application.security/free/kontra-aws-clould-top-10
#aws
A series of free interactive security training modules that teach developers how to identify and mitigate security vulnerabilities in their AWS-hosted cloud applications.
https://application.security/free/kontra-aws-clould-top-10
#aws
🔶 Inside Figma: securing internal web apps
A deep-dive into how Figma built a system for securing internal web applications that lets them require SSO authentication, enforce fine-grained authorization (via Okta groups), and support CLI tools, all using ALBs, AWS Cognito, and Okta.
https://www.figma.com/blog/inside-figma-securing-internal-web-apps/
#aws
A deep-dive into how Figma built a system for securing internal web applications that lets them require SSO authentication, enforce fine-grained authorization (via Okta groups), and support CLI tools, all using ALBs, AWS Cognito, and Okta.
https://www.figma.com/blog/inside-figma-securing-internal-web-apps/
#aws
Figma
Inside Figma: securing internal web apps | Figma Blog
A deep-dive into how we provide access to internal applications
🔷 Spoofing Azure AD sign-ins logs by imitating AD FS Hybrid Health Agent
How anyone with a local administrator access to AD FS server (or proxy), can create arbitrary sign-ins events to Azure AD sign-ins log.
https://o365blog.com/post/hybridhealthagent/
#azure
How anyone with a local administrator access to AD FS server (or proxy), can create arbitrary sign-ins events to Azure AD sign-ins log.
https://o365blog.com/post/hybridhealthagent/
#azure
O365Blog
Spoofing Azure AD sign-ins logs by imitating AD FS Hybrid Health Agent
Azure AD Connect Health is a feature that allows viewing the health of on-prem hybrid infrastructure components, including Azure AD Connect and AD FS servers.
Health information is gathered by agents installed on each on-prem hybrid server. Since March 2021…
Health information is gathered by agents installed on each on-prem hybrid server. Since March 2021…
🔶 Spice up Your Kubernetes Environment with AWS Lambda
How to securely integrate AWS Lambda with an existing Kubernetes environment without codes changes.
https://liavyona09.medium.com/spice-up-your-kubernetes-environment-with-aws-lambda-a07d81347607
#aws
How to securely integrate AWS Lambda with an existing Kubernetes environment without codes changes.
https://liavyona09.medium.com/spice-up-your-kubernetes-environment-with-aws-lambda-a07d81347607
#aws
Medium
Spice up Your Kubernetes Environment with AWS Lambda
Kubernetes is a powerful container orchestration platform for automating applications’ deployment, scaling and management. Kubernetes…
🔶 The last S3 security document that we’ll ever need, and how to use it
163 page Threat Model of S3 by TrustOnCloud’s Jonathan Rault covering:
1️⃣ Best practices (best security/effort ratio)
2️⃣ Reviewing the service depending on your application(s), and implementing the controls based on your risk tolerance
3️⃣ Onboarding for large enterprises/agencies
4️⃣ Compliance mapping to demonstrate a risk-based approach, gap analysis and formulating an action plan
https://trustoncloud.com/the-last-s3-security-document-that-well-ever-need/
#aws
163 page Threat Model of S3 by TrustOnCloud’s Jonathan Rault covering:
1️⃣ Best practices (best security/effort ratio)
2️⃣ Reviewing the service depending on your application(s), and implementing the controls based on your risk tolerance
3️⃣ Onboarding for large enterprises/agencies
4️⃣ Compliance mapping to demonstrate a risk-based approach, gap analysis and formulating an action plan
https://trustoncloud.com/the-last-s3-security-document-that-well-ever-need/
#aws
Twitter
Jonathan Rault (@jo_n_go) | Twitter
The latest Tweets from Jonathan Rault (@jo_n_go). Head of Cloud Sec at @trustoncloud. Singapore
Yandex Cloud Security Checklist
Dear friends, we have prepared for you the first checklist on the secure configuration of Yandex.Cloud. It is based on an aggregation of everything that is in the YC documentation on the topic of security, plus some experience revealed in the framework of audits. Globally, the checklist is split into network security and access control domains.
The main problem is that almost all the security mechanisms (security groups, audit trails), which are already few, are either in the preview stage or are connected on-demand. The rest of the mechanisms are connected through the marketplace from several of third-party commercial solutions.
UPD. By the way, if you want to pass some of the checks by automated means, then we recommend Cloud Advisor. There, in particular, there is still the opportunity to conduct a free scan.
#yandex
Dear friends, we have prepared for you the first checklist on the secure configuration of Yandex.Cloud. It is based on an aggregation of everything that is in the YC documentation on the topic of security, plus some experience revealed in the framework of audits. Globally, the checklist is split into network security and access control domains.
The main problem is that almost all the security mechanisms (security groups, audit trails), which are already few, are either in the preview stage or are connected on-demand. The rest of the mechanisms are connected through the marketplace from several of third-party commercial solutions.
UPD. By the way, if you want to pass some of the checks by automated means, then we recommend Cloud Advisor. There, in particular, there is still the opportunity to conduct a free scan.
#yandex
GitHub
GitHub - Vinum-Security/yandex-cloud-security: ⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key…
⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs. - Vinum-Security/yandex-cloud-security
🔴 Using the new Google Cloud Config Controller to provision and manage cloud services via the Kubernetes Resource Model
How to manually configure a GKE cluster, and how to use the new Config Controller to provision and configure services via automation.
https://seroter.com/2021/08/18/using-the-new-google-cloud-config-controller-to-provision-and-manage-cloud-services-via-the-kubernetes-resource-model/
#gcp
How to manually configure a GKE cluster, and how to use the new Config Controller to provision and configure services via automation.
https://seroter.com/2021/08/18/using-the-new-google-cloud-config-controller-to-provision-and-manage-cloud-services-via-the-kubernetes-resource-model/
#gcp
Richard Seroter's Architecture Musings
Using the new Google Cloud Config Controller to provision and manage cloud services via the Kubernetes Resource Model
When it comes to building and managing cloud resources—VMs, clusters, user roles, databases—most people seem to use a combination of tools. The recent JetBrains developer ecosystem survey highlight…
🔶 AWS OIDC Authentication with SPIFFE
How to authenticate data center applications to AWS using automated SPIFFE credentials.
https://developer.squareup.com/blog/aws-oidc-authentication-with-spiffe/
#aws
How to authenticate data center applications to AWS using automated SPIFFE credentials.
https://developer.squareup.com/blog/aws-oidc-authentication-with-spiffe/
#aws
Square Corner Blog
AWS OIDC Authentication with SPIFFE
Easy authentication with automated AWS credentials
🔷 Illogical Apps - Exploring and Exploiting Azure Logic Apps
How to obtain sensitive information as an user with the Reader role, and how to identify/abuse API Connection hijack scenarios as a Contributor in Azure Logic Apps.
https://www.netspi.com/blog/technical/cloud-penetration-testing/illogical-apps-exploring-exploiting-azure-logic-apps/
#azure
How to obtain sensitive information as an user with the Reader role, and how to identify/abuse API Connection hijack scenarios as a Contributor in Azure Logic Apps.
https://www.netspi.com/blog/technical/cloud-penetration-testing/illogical-apps-exploring-exploiting-azure-logic-apps/
#azure
NetSPI
Illogical Apps – Exploring and Exploiting Azure Logic Apps
A walk through enumerating and exploiting Azure Logic Apps with varying permissions.
🔶 Security Implication of Root principal in AWS
An interesting way of abusing the AWS KMS for data exfiltration in restricted VPCs.
https://niebardzo.github.io/2021-08-23-root-principal-in-aws/
#aws
An interesting way of abusing the AWS KMS for data exfiltration in restricted VPCs.
https://niebardzo.github.io/2021-08-23-root-principal-in-aws/
#aws
niebardzo.github.io
Security Implication of Root principal in AWS
How simple mistake can ruin your security
🔷 ChaosDB: How we hacked thousands of Azure customers’ databases
Researchers were able to gain complete unrestricted access to the accounts and databases of several thousand Microsoft Azure customers. Also refer to the companion blog post to learn how to protect your environment from ChaosDB.
https://www.wiz.io/blog/chaosdb-how-we-hacked-thousands-of-azure-customers-databases
#azure
Researchers were able to gain complete unrestricted access to the accounts and databases of several thousand Microsoft Azure customers. Also refer to the companion blog post to learn how to protect your environment from ChaosDB.
https://www.wiz.io/blog/chaosdb-how-we-hacked-thousands-of-azure-customers-databases
#azure
wiz.io
ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them | Wiz Blog
Wiz Research found an unprecedented critical vulnerability in Azure Cosmos DB. The vulnerability gives any Azure user full admin access (read, write, delete) to another customers Cosmos DB instances without authorization.
Threat_Hunting_in_the_Cloud_Defending_AWS,_Azure_and_Other_Cloud.pdf
29.1 MB
🔶🔷🔴 Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.
#aws #azure #gcp
In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.
#aws #azure #gcp
🔶 Inside Figma: getting out of the (secure) shell
Tips from the Figma security team to help other teams secure Systems Manager and protect their most sensitive data.
https://www.figma.com/blog/inside-figma-getting-out-of-the-secure-shell/
#aws
Tips from the Figma security team to help other teams secure Systems Manager and protect their most sensitive data.
https://www.figma.com/blog/inside-figma-getting-out-of-the-secure-shell/
#aws
Figma
Inside Figma: getting out of the (secure) shell | Figma Blog
Tips from the Figma security team to help other teams secure Systems Manager and protect their most sensitive data
🔷 Azure-Pentest
A collection of resources and notes useful for pentest and red team engagements against Azure.
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Cloud%20-%20Azure%20Pentest.md
#azure
A collection of resources and notes useful for pentest and red team engagements against Azure.
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Cloud%20-%20Azure%20Pentest.md
#azure
GitHub
PayloadsAllTheThings/Methodology and Resources/Cloud - Azure Pentest.md at master · swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
❤1
🔴 Automate Your Security in GCP with Serverless Computing
Talk exploring serverless open source tools and other cloud-native options that allow you to automate your cloud security without the need for human interaction.
https://youtu.be/jCQTeglIfeI
#gcp
Talk exploring serverless open source tools and other cloud-native options that allow you to automate your cloud security without the need for human interaction.
https://youtu.be/jCQTeglIfeI
#gcp
YouTube
Automate Your Security in GCP with Serverless Computing
Automating security in the cloud can increase your response time, lower your risk, reduce costs, and even boost your security team's efficiency. Google Cloud Platform (GCP) logs events in real-time, allowing you to remediate insecure resources or reverse…
🔷 Coordinated disclosure of vulnerability in Azure Container Instances Service
Microsoft recently mitigated a vulnerability reported by a security researcher in the Azure Container Instances (ACI) that could potentially allow a user to access other customers information in the ACI service. Microsoft's investigation surfaced no unauthorized access to customer data. You can also check the original post disclosing the vulnerability and another that explains What to do? to address it.
https://msrc-blog.microsoft.com/2021/09/08/coordinated-disclosure-of-vulnerability-in-azure-container-instances-service/
#azure
Microsoft recently mitigated a vulnerability reported by a security researcher in the Azure Container Instances (ACI) that could potentially allow a user to access other customers information in the ACI service. Microsoft's investigation surfaced no unauthorized access to customer data. You can also check the original post disclosing the vulnerability and another that explains What to do? to address it.
https://msrc-blog.microsoft.com/2021/09/08/coordinated-disclosure-of-vulnerability-in-azure-container-instances-service/
#azure
Unit 42
Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances
Affecting Azure Container Instances, Azurescape is the first known cross-account container takeover in the public cloud.
🔴 Bypassing GCP Org Policy with Custom Metadata
Google makes use of custom metadata to authorize access to AI Notebooks and their web UIs. Individuals granted access via custom metadata need not have any IAM permissions on the compute instance, on the service account running the Notebook or even be a member of the Organization. This kind of authorization bypasses a specific Organization Policy Constraint which restricts cross-domain resource sharing.
https://kattraxler.github.io/gcp/hacking/2021/09/10/gcp-org-policy-bypass-ai-notebooks.html
#gcp
Google makes use of custom metadata to authorize access to AI Notebooks and their web UIs. Individuals granted access via custom metadata need not have any IAM permissions on the compute instance, on the service account running the Notebook or even be a member of the Organization. This kind of authorization bypasses a specific Organization Policy Constraint which restricts cross-domain resource sharing.
https://kattraxler.github.io/gcp/hacking/2021/09/10/gcp-org-policy-bypass-ai-notebooks.html
#gcp
🔶 AWS Authentication: Principals in AWS IAM
Newcomers to AWS can sometimes get confused by what it means to have AWS credentials. This article aims to explain the basics of AWS authentication, that is, the way you gain an identity that you can use to access AWS services.
https://ben11kehoe.medium.com/principals-in-aws-iam-38c4a3dc322a
#aws
Newcomers to AWS can sometimes get confused by what it means to have AWS credentials. This article aims to explain the basics of AWS authentication, that is, the way you gain an identity that you can use to access AWS services.
https://ben11kehoe.medium.com/principals-in-aws-iam-38c4a3dc322a
#aws
Medium
AWS Authentication: Principals in AWS IAM
This article explains the basics of AWS authentication: the way you gain an identity that you can use to access AWS services