🔶 History of Amazon Web Services
A page collecting the history of AWS service announcements and releases.
https://www.awsgeek.com/AWS-History/
#aws
A page collecting the history of AWS service announcements and releases.
https://www.awsgeek.com/AWS-History/
#aws
🔥5❤1👍1
🔴 Announcing expanded Sensitive Data Protection for Cloud Storage
GCP's Sensitive Data Protection (SDP) discovery service now supports Cloud Storage, joining BigQuery, BigLake, and Cloud SQL.
https://cloud.google.com/blog/products/identity-security/announcing-expanded-sensitive-data-protection-for-cloud-storage
#gcp
GCP's Sensitive Data Protection (SDP) discovery service now supports Cloud Storage, joining BigQuery, BigLake, and Cloud SQL.
https://cloud.google.com/blog/products/identity-security/announcing-expanded-sensitive-data-protection-for-cloud-storage
#gcp
👍3❤1🔥1
🔶 Implement an early feedback loop with AWS developer tools to shift security left
How to use AWS CodeCommit to securely host Git repositories, AWS CodePipeline to automate continuous delivery pipelines, AWS CodeBuild to build and test code, and Amazon CodeGuru Reviewer to detect potential code defects.
https://aws.amazon.com/ru/blogs/security/implement-an-early-feedback-loop-with-aws-developer-tools-to-shift-security-left/
(Use VPN to open from Russia)
#aws
How to use AWS CodeCommit to securely host Git repositories, AWS CodePipeline to automate continuous delivery pipelines, AWS CodeBuild to build and test code, and Amazon CodeGuru Reviewer to detect potential code defects.
https://aws.amazon.com/ru/blogs/security/implement-an-early-feedback-loop-with-aws-developer-tools-to-shift-security-left/
(Use VPN to open from Russia)
#aws
👍4❤1🔥1
🔶 Access AWS services programmatically using trusted identity propagation
With the introduction of trusted identity propagation, applications can now propagate a user's workforce identity from their identity provider (IdP) to applications running in AWS and to storage services backing those applications, such as S3 or Glue.
https://aws.amazon.com/ru/blogs/security/access-aws-services-programmatically-using-trusted-identity-propagation/
(Use VPN to open from Russia)
#aws
With the introduction of trusted identity propagation, applications can now propagate a user's workforce identity from their identity provider (IdP) to applications running in AWS and to storage services backing those applications, such as S3 or Glue.
https://aws.amazon.com/ru/blogs/security/access-aws-services-programmatically-using-trusted-identity-propagation/
(Use VPN to open from Russia)
#aws
❤4👍2🔥1
🔶 Moving AWS Accounts and OUs Within An Organization - Not So Simple!
This post explores the potential implications of moving an AWS account or OU to another OU within the same Organization, including impacts to SCP policy inheritance, CloudFormation StackSet deployments, IAM policy conditions, RAM shares, and Control Tower enrollments.
https://blog.wut.dev/2024/07/05/moving-aws-accounts-within-organization.html
#aws
This post explores the potential implications of moving an AWS account or OU to another OU within the same Organization, including impacts to SCP policy inheritance, CloudFormation StackSet deployments, IAM policy conditions, RAM shares, and Control Tower enrollments.
https://blog.wut.dev/2024/07/05/moving-aws-accounts-within-organization.html
#aws
👍3❤2🔥1
🔶 Delete unused AMIs using the new 'LastLaunchedTime' attribute
Reduce your AWS costs by (more) safely deleting unused AMIs.
https://st-g.de/2024/05/delete-unused-amis
#aws
Reduce your AWS costs by (more) safely deleting unused AMIs.
https://st-g.de/2024/05/delete-unused-amis
#aws
🔥3👍2❤1
🔴 IAM so lost: A guide to identity in Google Cloud
An entry-level post demystifying two foundational IAM access control principles: the concepts of least privilege and separation of duties.
https://cloud.google.com/blog/products/identity-security/scaling-the-iam-mountain-an-in-depth-guide-to-identity-in-google-cloud/
#gcp
An entry-level post demystifying two foundational IAM access control principles: the concepts of least privilege and separation of duties.
https://cloud.google.com/blog/products/identity-security/scaling-the-iam-mountain-an-in-depth-guide-to-identity-in-google-cloud/
#gcp
👍4❤2🔥1
🔶 Strategies for achieving least privilege at scale - Part 1
This blog post walked through the first five (of nine) strategies for achieving least privilege at scale.
https://aws.amazon.com/ru/blogs/security/strategies-for-achieving-least-privilege-at-scale-part-1/
(Use VPN to open from Russia)
#aws
This blog post walked through the first five (of nine) strategies for achieving least privilege at scale.
https://aws.amazon.com/ru/blogs/security/strategies-for-achieving-least-privilege-at-scale-part-1/
(Use VPN to open from Russia)
#aws
❤4👍1🔥1
🔶 Strategies for achieving least privilege at scale - Part 2
This second post continues to look at the remaining four strategies and related mental models for scaling least privilege across your organization.
https://aws.amazon.com/ru/blogs/security/strategies-for-achieving-least-privilege-at-scale-part-2/
(Use VPN to open from Russia)
#aws
This second post continues to look at the remaining four strategies and related mental models for scaling least privilege across your organization.
https://aws.amazon.com/ru/blogs/security/strategies-for-achieving-least-privilege-at-scale-part-2/
(Use VPN to open from Russia)
#aws
❤4👍3🔥1
🔶 Building the foundations: A defender's guide to AWS Bedrock
This blog focuses on AWS Bedrock and its relevant telemetry streams: CloudTrail management and data events, model invocation telemetry and endpoint telemetry.
https://www.sumologic.com/blog/defenders-guide-to-aws-bedrock/
#aws
This blog focuses on AWS Bedrock and its relevant telemetry streams: CloudTrail management and data events, model invocation telemetry and endpoint telemetry.
https://www.sumologic.com/blog/defenders-guide-to-aws-bedrock/
#aws
👍3🔥3❤1
🔶 Thwacking DDOS with AWS WAF
AWS WAF is definitely not the best DDOS prevention tech on the market. But if you're ever in the seat and it's the tool you have, here's your guide.
https://ramimac.me/waf-ddos
#aws
AWS WAF is definitely not the best DDOS prevention tech on the market. But if you're ever in the seat and it's the tool you have, here's your guide.
https://ramimac.me/waf-ddos
#aws
👍4❤2🔥1
🔶 Poor mans MFA for AWS Client VPN
The AWS Client VPN service is a common way to seamlessly connect users into internal networks. This post describes a low-tech, low-cost solution to better authenticate users using a second factor.
https://onecloudplease.com/blog/poor-mans-mfa-for-aws-client-vpn
#aws
The AWS Client VPN service is a common way to seamlessly connect users into internal networks. This post describes a low-tech, low-cost solution to better authenticate users using a second factor.
https://onecloudplease.com/blog/poor-mans-mfa-for-aws-client-vpn
#aws
🔥3👍2❤1
🔶 A hard look at GuardDuty shortcomings
Is GuardDuty all you need for AWS threat detection? This post offers some results of adversarial simulation, a review of detection latency, and an analysis of projected S3 ransomware timing.
https://tracebit.com/blog/a-hard-look-at-guardduty-shortcomings
#aws
Is GuardDuty all you need for AWS threat detection? This post offers some results of adversarial simulation, a review of detection latency, and an analysis of projected S3 ransomware timing.
https://tracebit.com/blog/a-hard-look-at-guardduty-shortcomings
#aws
❤3👍2🔥1
🔶 Using S3 as a container registry
You can use S3 as a container registry. All it takes is to expose an S3 bucket through HTTP and to upload the image's files to specific paths.
https://ochagavia.nl/blog/using-s3-as-a-container-registry/
#aws
You can use S3 as a container registry. All it takes is to expose an S3 bucket through HTTP and to upload the image's files to specific paths.
https://ochagavia.nl/blog/using-s3-as-a-container-registry/
#aws
🔥4👍2❤1🤔1
This media is not supported in your browser
VIEW IN TELEGRAM
🔴 ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions
Organizations that have used GCP's Cloud Functions could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as ConfusedFunction.
https://www.tenable.com/blog/confusedfunction-a-privilege-escalation-vulnerability-impacting-gcp-cloud-functions
(Use VPN to open from Russia)
#gcp
Organizations that have used GCP's Cloud Functions could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as ConfusedFunction.
https://www.tenable.com/blog/confusedfunction-a-privilege-escalation-vulnerability-impacting-gcp-cloud-functions
(Use VPN to open from Russia)
#gcp
👍3🔥3❤1
A forensic analysis of Azure Run Command activities, focusing on how to detect and investigate potential misuse.
https://www.cadosecurity.com/blog/azure-run-command-forensics
#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥3❤1
🔴 Zero Trust and BeyondCorp Google Cloud
Some sketchnotes on Zero Trust and BeyondCorp Google Cloud.
https://cloud.google.com/blog/topics/developers-practitioners/zero-trust-and-beyondcorp-google-cloud
#gcp
Some sketchnotes on Zero Trust and BeyondCorp Google Cloud.
https://cloud.google.com/blog/topics/developers-practitioners/zero-trust-and-beyondcorp-google-cloud
#gcp
🔥4👍2❤1
🔴 Announcing VPC Service Controls with private IPs to extend data exfiltration protection
VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping you limit access to your sensitive data.
https://cloud.google.com/blog/products/identity-security/announcing-vpc-service-controls-with-private-ips-to-extend-data-exfiltration-protection
#gcp
VPC Service Controls (VPC-SC) creates isolation perimeters around cloud resources and networks in Google Cloud, helping you limit access to your sensitive data.
https://cloud.google.com/blog/products/identity-security/announcing-vpc-service-controls-with-private-ips-to-extend-data-exfiltration-protection
#gcp
🔥4👍2❤1
🔶 How to use the AWS Secrets Manager Agent
The Secrets Manager Agent is a client-side agent that allows you to standardize consumption of secrets from Secrets Manager across your AWS compute environments.
https://aws.amazon.com/ru/blogs/security/how-to-use-the-aws-secrets-manager-agent/
(Use VPN to open from Russia)
#aws
The Secrets Manager Agent is a client-side agent that allows you to standardize consumption of secrets from Secrets Manager across your AWS compute environments.
https://aws.amazon.com/ru/blogs/security/how-to-use-the-aws-secrets-manager-agent/
(Use VPN to open from Russia)
#aws
👍3🔥2❤1
Identity Protection, and the associated Risky reports, are a quick and easy starting point to check if Microsoft has flagged any risky sign-ins, workloads, or users.
https://www.invictus-ir.com/news/a-deep-dive-into-entra-id-identity-protection-for-incident-response
#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4👍2❤1
🔶 Poisoning the SSM Command Document Well
A post disclosing risks in using SSM Command Docs for software distribution.
https://ramimac.me/poisoning-ssm-command-docs
#aws
A post disclosing risks in using SSM Command Docs for software distribution.
https://ramimac.me/poisoning-ssm-command-docs
#aws
👍2❤1🔥1