CloudSec Wine – Telegram
CloudSec Wine
2.11K subscribers
890 photos
18 files
1.24K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔴 Leaving Bastion Hosts Behind

Post examining GCP services like OS Login and Identity-Aware Proxy (IAP), and showing how they can be used as an alternative to bastion hosts.

https://www.netskope.com/blog/leaving-bastion-hosts-behind-part-1-gcp

#gcp
🔶 AWS Condition Context Keys for Reducing Risk

Post taking a closer look at the "aws:CalledVia*" and "aws:ViaAWSService" keys, and how you can use them to achieve least privilege.

https://ermetic.com/whats-new/blog/aws/aws-condition-context-keys-for-reducing-risk

#aws
🔶 KONTRA's AWS Top 10

A series of free interactive security training modules that teach developers how to identify and mitigate security vulnerabilities in their AWS-hosted cloud applications.

https://application.security/free/kontra-aws-clould-top-10

#aws
🔶 Inside Figma: securing internal web apps

A deep-dive into how Figma built a system for securing internal web applications that lets them require SSO authentication, enforce fine-grained authorization (via Okta groups), and support CLI tools, all using ALBs, AWS Cognito, and Okta.

https://www.figma.com/blog/inside-figma-securing-internal-web-apps/

#aws
🔶 The last S3 security document that we’ll ever need, and how to use it

163 page Threat Model of S3 by TrustOnCloud’s Jonathan Rault covering:

1️⃣ Best practices (best security/effort ratio)
2️⃣ Reviewing the service depending on your application(s), and implementing the controls based on your risk tolerance
3️⃣ Onboarding for large enterprises/agencies
4️⃣ Compliance mapping to demonstrate a risk-based approach, gap analysis and formulating an action plan

https://trustoncloud.com/the-last-s3-security-document-that-well-ever-need/

#aws
Yandex Cloud Security Checklist

Dear friends, we have prepared for you the first checklist on the secure configuration of Yandex.Cloud. It is based on an aggregation of everything that is in the YC documentation on the topic of security, plus some experience revealed in the framework of audits. Globally, the checklist is split into network security and access control domains.

The main problem is that almost all the security mechanisms (security groups, audit trails), which are already few, are either in the preview stage or are connected on-demand. The rest of the mechanisms are connected through the marketplace from several of third-party commercial solutions.

UPD. By the way, if you want to pass some of the checks by automated means, then we recommend Cloud Advisor. There, in particular, there is still the opportunity to conduct a free scan.

#yandex
🔶 AWS OIDC Authentication with SPIFFE

How to authenticate data center applications to AWS using automated SPIFFE credentials.

https://developer.squareup.com/blog/aws-oidc-authentication-with-spiffe/

#aws
🔷 Illogical Apps - Exploring and Exploiting Azure Logic Apps

How to obtain sensitive information as an user with the Reader role, and how to identify/abuse API Connection hijack scenarios as a Contributor in Azure Logic Apps.

https://www.netspi.com/blog/technical/cloud-penetration-testing/illogical-apps-exploring-exploiting-azure-logic-apps/

#azure
🔶 Security Implication of Root principal in AWS

An interesting way of abusing the AWS KMS for data exfiltration in restricted VPCs.

https://niebardzo.github.io/2021-08-23-root-principal-in-aws/

#aws
Threat_Hunting_in_the_Cloud_Defending_AWS,_Azure_and_Other_Cloud.pdf
29.1 MB
🔶🔷🔴 Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.

#aws #azure #gcp
🔶 Inside Figma: getting out of the (secure) shell

Tips from the Figma security team to help other teams secure Systems Manager and protect their most sensitive data.

https://www.figma.com/blog/inside-figma-getting-out-of-the-secure-shell/

#aws
🔴 Automate Your Security in GCP with Serverless Computing

Talk exploring serverless open source tools and other cloud-native options that allow you to automate your cloud security without the need for human interaction.

https://youtu.be/jCQTeglIfeI

#gcp
🔷 Coordinated disclosure of vulnerability in Azure Container Instances Service

Microsoft recently mitigated a vulnerability reported by a security researcher in the Azure Container Instances (ACI) that could potentially allow a user to access other customers information in the ACI service. Microsoft's investigation surfaced no unauthorized access to customer data. You can also check the original post disclosing the vulnerability and another that explains What to do? to address it.

https://msrc-blog.microsoft.com/2021/09/08/coordinated-disclosure-of-vulnerability-in-azure-container-instances-service/

#azure
🔴 Bypassing GCP Org Policy with Custom Metadata

Google makes use of custom metadata to authorize access to AI Notebooks and their web UIs. Individuals granted access via custom metadata need not have any IAM permissions on the compute instance, on the service account running the Notebook or even be a member of the Organization. This kind of authorization bypasses a specific Organization Policy Constraint which restricts cross-domain resource sharing.

https://kattraxler.github.io/gcp/hacking/2021/09/10/gcp-org-policy-bypass-ai-notebooks.html

#gcp
🔶 AWS Authentication: Principals in AWS IAM

Newcomers to AWS can sometimes get confused by what it means to have AWS credentials. This article aims to explain the basics of AWS authentication, that is, the way you gain an identity that you can use to access AWS services.

https://ben11kehoe.medium.com/principals-in-aws-iam-38c4a3dc322a

#aws