🔹GitHub Action for Azure Policy Compliance Scan
It is now possible to trigger on-demand Azure policy compliance evaluations from GitHub workflows.
https://github.com/marketplace/actions/azure-policy-compliance-scan
#azure
It is now possible to trigger on-demand Azure policy compliance evaluations from GitHub workflows.
https://github.com/marketplace/actions/azure-policy-compliance-scan
#azure
GitHub
Azure Policy Compliance Scan - GitHub Marketplace
Triggers compliance scan on Azure resources and passes/fails based on the compliance state of the resources
🔸Anatomy of AWS Lambda
Article taking a closer look on the anatomy of the AWS Lambda functions and the processes that are happening below the surface. If you are not super-familiar with Lambda, I highly recommend this post which provides a very well-thought introduction.
https://dev.to/sosnowski/anatomy-of-aws-lambda-1i1e
#aws
Article taking a closer look on the anatomy of the AWS Lambda functions and the processes that are happening below the surface. If you are not super-familiar with Lambda, I highly recommend this post which provides a very well-thought introduction.
https://dev.to/sosnowski/anatomy-of-aws-lambda-1i1e
#aws
🔹🔸⚪️Cloudkeeper - Housekeeping for Clouds
Cloudkeeper is a standalone CLI tool that periodically collects a list of resources in cloud accounts, provides metrics about them, and can clean them up.
https://github.com/mesosphere/cloudkeeper
#aws #gcp #azure
Cloudkeeper is a standalone CLI tool that periodically collects a list of resources in cloud accounts, provides metrics about them, and can clean them up.
https://github.com/mesosphere/cloudkeeper
#aws #gcp #azure
🔸Automate Amazon Athena queries for PCI DSS log review using AWS Lambda
How to use AWS Lambda to automate PCI DSS (v3.2.1) evidence generation, and daily log review to assist with your ongoing PCI DSS activities.
https://aws.amazon.com/ru/blogs/security/automate-amazon-athena-queries-for-pci-dss-log-review-using-aws-lambda/
#aws
How to use AWS Lambda to automate PCI DSS (v3.2.1) evidence generation, and daily log review to assist with your ongoing PCI DSS activities.
https://aws.amazon.com/ru/blogs/security/automate-amazon-athena-queries-for-pci-dss-log-review-using-aws-lambda/
#aws
Amazon
Automate Amazon Athena queries for PCI DSS log review using AWS Lambda | Amazon Web Services
In this post, I will show you how to use AWS Lambda to automate PCI DSS (v3.2.1) evidence generation, and daily log review to assist with your ongoing PCI DSS activities. We will specifically be looking at AWS CloudTrail Logs stored centrally in Amazon Simple…
Cyber_Security_on_Azure_An_IT_Professional’s_Guide_to_Microsoft.pdf
12.1 MB
🔹Cyber Security on Azure
Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies.
#azure #literature
Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies.
#azure #literature
🔸Securing resource tags used for authorization using a service control policy in AWS Organizations
How you can use attribute-based access controls (ABAC) in AWS to help provision simple, maintainable access controls to different projects, teams, and workloads as your organization grows.
https://aws.amazon.com/ru/blogs/security/securing-resource-tags-used-for-authorization-using-service-control-policy-in-aws-organizations/
#aws
How you can use attribute-based access controls (ABAC) in AWS to help provision simple, maintainable access controls to different projects, teams, and workloads as your organization grows.
https://aws.amazon.com/ru/blogs/security/securing-resource-tags-used-for-authorization-using-service-control-policy-in-aws-organizations/
#aws
🔸Certificate Authority now supports Private CA sharing
AWS Certificate Manager (ACM) Private Certificate Authority (CA) now supports sharing a Private CA with any AWS account or within your organization. This eliminates the need to provision duplicate resources in every account in a multi-account environment, reducing the cost and complexity of managing those resources in every account.
https://aws.amazon.com/ru/about-aws/whats-new/2020/08/aws-certificate-manager-private-certificate-authority-supports-private-ca-sharing/
#aws
AWS Certificate Manager (ACM) Private Certificate Authority (CA) now supports sharing a Private CA with any AWS account or within your organization. This eliminates the need to provision duplicate resources in every account in a multi-account environment, reducing the cost and complexity of managing those resources in every account.
https://aws.amazon.com/ru/about-aws/whats-new/2020/08/aws-certificate-manager-private-certificate-authority-supports-private-ca-sharing/
#aws
Amazon
AWS Certificate Manager Private Certificate Authority now supports Private CA sharing
🔷Attacking Azure & Azure AD, Part II
New post on attacking AzureAD Service Principals, Intune, and documenting an Azure Logic App primitive. Also introducing the complete re-write of PowerZure.
https://posts.specterops.io/attacking-azure-azure-ad-part-ii-5f336f36697d
#azure
New post on attacking AzureAD Service Principals, Intune, and documenting an Azure Logic App primitive. Also introducing the complete re-write of PowerZure.
https://posts.specterops.io/attacking-azure-azure-ad-part-ii-5f336f36697d
#azure
GitHub
GitHub - hausec/PowerZure: PowerShell framework to assess Azure security
PowerShell framework to assess Azure security. Contribute to hausec/PowerZure development by creating an account on GitHub.
🔸spacesiren/spacesiren
A honey token manager and alert system for AWS. With this fully serverless application, you can create and manage honey tokens at scale – up to 10,000 per SpaceSiren instance – at close to no cost… It provides an API to create no-permission AWS IAM users and access keys for those users.
https://github.com/spacesiren/spacesiren
#aws
A honey token manager and alert system for AWS. With this fully serverless application, you can create and manage honey tokens at scale – up to 10,000 per SpaceSiren instance – at close to no cost… It provides an API to create no-permission AWS IAM users and access keys for those users.
https://github.com/spacesiren/spacesiren
#aws
🔸The power of orchestration: how we automated enrichments for AWS alerts
How the Expel team automated enrichments for AWS alerts, with this blog sharing their approach to developing AWS enrichments and the implementation of the enrichment workflow process.
https://expel.io/blog/power-of-orchestration-how-we-automated-enrichments-aws-alerts/
#aws
How the Expel team automated enrichments for AWS alerts, with this blog sharing their approach to developing AWS enrichments and the implementation of the enrichment workflow process.
https://expel.io/blog/power-of-orchestration-how-we-automated-enrichments-aws-alerts/
#aws
🔸Privilege Escalation in AWS Elastic Kubernetes Service (EKS) by compromising the instance role of worker nodes
"In this post, we discuss the risks of the AWS Instance Metadata service in AWS Elastic Kubernetes Service (EKS) clusters. In particular, we demonstrate that compromising a pod in the cluster can have disastrous consequences on resources in the AWS account if access to the Instance Metadata service is not explicitly blocked."
https://blog.christophetd.fr/privilege-escalation-in-aws-elastic-kubernetes-service-eks-by-compromising-the-instance-role-of-worker-nodes/
by @mobile_appsec_world
#aws
"In this post, we discuss the risks of the AWS Instance Metadata service in AWS Elastic Kubernetes Service (EKS) clusters. In particular, we demonstrate that compromising a pod in the cluster can have disastrous consequences on resources in the AWS account if access to the Instance Metadata service is not explicitly blocked."
https://blog.christophetd.fr/privilege-escalation-in-aws-elastic-kubernetes-service-eks-by-compromising-the-instance-role-of-worker-nodes/
by @mobile_appsec_world
#aws
Christophe Tafani-Dereeper
Privilege Escalation in AWS Elastic Kubernetes Service (EKS) by compromising the instance role of worker nodes - Christophe Tafani…
In this post, we discuss the risks of the AWS Instance Metadata service in AWS Elastic Kubernetes Service (EKS) clusters. In particular, we demonstrate that compromising a pod in the cluster can have disastrous consequences on resources in the AWS account…
🔹Become an Azure Security Center Ninja
This blog post has a curation of many Azure Security Center (ASC) resources, organized in a format that can help you to go from absolutely no knowledge in ASC, to design and implement different scenarios. You can use this blog post as a training roadmap to learn more about Azure Security Center.
https://techcommunity.microsoft.com/t5/azure-security-center/become-an-azure-security-center-ninja/ba-p/1608761
#azure
This blog post has a curation of many Azure Security Center (ASC) resources, organized in a format that can help you to go from absolutely no knowledge in ASC, to design and implement different scenarios. You can use this blog post as a training roadmap to learn more about Azure Security Center.
https://techcommunity.microsoft.com/t5/azure-security-center/become-an-azure-security-center-ninja/ba-p/1608761
#azure
TECHCOMMUNITY.MICROSOFT.COM
Become a Microsoft Defender for Cloud Ninja
[Last update: 12/07/2023]
This blog post has a curation of many Microsoft Defender for Cloud (formerly known as Azure Security Center and Azure Defender)..
This blog post has a curation of many Microsoft Defender for Cloud (formerly known as Azure Security Center and Azure Defender)..
AWS_Kali.pdf
36 MB
🔸AWS Penetration Testing with Kali Linux
Key Features:
- Efficiently perform penetration testing techniques on your public cloud instances
- Learn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelines
- A step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environment
#aws
Key Features:
- Efficiently perform penetration testing techniques on your public cloud instances
- Learn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelines
- A step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environment
#aws
🔸Use HashiCorp Vault AWS engine with multiple accounts
Post breaking down how the Vault secrets engine works and how to use it to dynamically create credentials across multiple AWS accounts using the assume_role feature.
https://nedinthecloud.com/2020/08/29/use-hashicorp-vault-aws-engine-with-multiple-accounts/
#aws
Post breaking down how the Vault secrets engine works and how to use it to dynamically create credentials across multiple AWS accounts using the assume_role feature.
https://nedinthecloud.com/2020/08/29/use-hashicorp-vault-aws-engine-with-multiple-accounts/
#aws
Ned In The Cloud
Use HashiCorp Vault AWS engine with multiple accounts
The world of technology is constantly shifting and evolving. Stay up to date on the latest concepts and conversations with these posts from Ned in the Cloud.
🔸S3Insights: Derive insights about your S3 environment at scale
More neat work from Uber’s Ashish Kurmi (See also: How Uber Continuously Monitors the Security of its AWS Environment). S3Insights is a platform for efficiently deriving security insights about S3 data through system metadata analysis. Rather than analyzing the content of individual objects, S3Insights harvests S3 inventory data from multiple buckets in a multi-account environment to help discover and manage sensitive data.
#aws
More neat work from Uber’s Ashish Kurmi (See also: How Uber Continuously Monitors the Security of its AWS Environment). S3Insights is a platform for efficiently deriving security insights about S3 data through system metadata analysis. Rather than analyzing the content of individual objects, S3Insights harvests S3 inventory data from multiple buckets in a multi-account environment to help discover and manage sensitive data.
#aws
🔸Record AWS API calls to improve IAM Policies
Have you ever looked at an IAM policy and wondered: Is it really necessary to grant access to this specific action? CloudTrail can help here, but there is something better: Record API calls with Client Side Monitoring.
https://cloudonaut.io/record-aws-api-calls-to-improve-iam-policies/
#aws
Have you ever looked at an IAM policy and wondered: Is it really necessary to grant access to this specific action? CloudTrail can help here, but there is something better: Record API calls with Client Side Monitoring.
https://cloudonaut.io/record-aws-api-calls-to-improve-iam-policies/
#aws
cloudonaut
Record AWS API calls to improve IAM Policies
Have you ever looked at an IAM policy and wondered: Is it really necessary to grant access to this specific action? Or do you...
This media is not supported in your browser
VIEW IN TELEGRAM
🔸iam-policies-cli
A CLI tool for building simple to complex IAM policies based on CloudFormation templates.
https://github.com/mhlabs/iam-policies-cli
#aws
A CLI tool for building simple to complex IAM policies based on CloudFormation templates.
https://github.com/mhlabs/iam-policies-cli
#aws
🔸Awesome AWS S3 - Security, Tools and Intel
Collection of tools, techniques and useful links concerning security and exposed AWS S3 Buckets
https://github.com/mxm0z/awesome-sec-s3#awesome-aws-s3---security-tools-and-intel
#aws
Collection of tools, techniques and useful links concerning security and exposed AWS S3 Buckets
https://github.com/mxm0z/awesome-sec-s3#awesome-aws-s3---security-tools-and-intel
#aws
GitHub
GitHub - mxm0z/awesome-sec-s3: A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets
A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets - mxm0z/awesome-sec-s3
🔸Security Architecture Review Of A Cloud Native Environment
Walkthrough of a cloud security assessment performed on an organisation which had recently moved their infrastructure from an on-prem to a cloud native solution (AWS).
https://notsosecure.com/security-architecture-review-of-a-cloud-native-environment/
#aws
Walkthrough of a cloud security assessment performed on an organisation which had recently moved their infrastructure from an on-prem to a cloud native solution (AWS).
https://notsosecure.com/security-architecture-review-of-a-cloud-native-environment/
#aws