[tl;dr sec] #170 - Prototype Pollution, Fuzzing, SOC Metrics • How to use granular geographic match rules with AWS WAF • How to monitor and query IAM resources at scale – Part 2 • How to monitor and query IAM resources at scale – Part 1 • Top 2022 AWS data protection service and cryptography tool launches • internetmonitor: 4 updated actions, 2 updated resources • ecs: 1 new action | 1 updated action • resiliencehub: 13 new actions • fwd:cloudsec 2023 • How to monitor and query IAM resources at scale – Part 1 | Amazon Web Services • A role for all your EC2 instances • Create a Console Session from IAM Credentials - Hacking The Cloud • I published a blog post (and PoC CLI) describing how the new Systems Manager Default Host Management Configuration (what a mouthful) provides a new way to pass an IAM role to all EC2 instances in your account+region - even those without instance profiles. <a href="https://t.co/qwsZp4rMHV" target="_blank">awsteele.com/blog/2023/02/2…</a> • I am in constant awe of Aidan's ability to quickly jump onto a new feature, figure out how it works, develop a new tool that uses that, write a blog post, and in this case communicate findings to AWS security and create a diagram! This was 75 hours from announcement to all this! • It’s not S3 ransomware unless it comes from the global region of AWS. Otherwise, it’s just “sparkling bucket encryption events”. • 🗒️ <a href="https://twitter.com/owasp" target="_blank">@owasp</a> Kubernetes Top 10 Broken down into 3 categories in order of likelihood: 1️⃣ Misconfigurations 2️⃣ Lack of visibility 3️⃣ Vulnerability management Risks, mitigations, and lots of relevant tools By <a href="https://twitter.com/sysdig" target="_blank">@sysdig</a> <a href="https://t.co/Qx32pBwtLg" target="_blank">sysdig.com/blog/top-owasp…</a> • Managing IAM resources or building security solutions to monitor them. You will want to read these two blog posts on everything IAM APIs👇 • The latest in prototype pollution 🧵 <a href="https://twitter.com/hashtag/bugbounty" target="_blank">#bugbounty</a> <a href="https://twitter.com/hashtag/bugbountytips" target="_blank">#bugbountytips</a> • 🎫 Ticket date announcement! 🎫 fwd:cloudsec tickets will be on sale in two batches on Feb 27 11:59AM ET and Feb 27 11:59PM ET! No inflation here… tickets will continue to be $100 this year. <a href="https://t.co/lpX9z5lE5Z" target="_blank">eventbrite.com/e/556255303587/</a> • AWS APIs now have at least three methods (let me know which ones I'm missing!) of authentication by asymmetric crypto: 1. SigV4A uses the `Authorization` header with algorithm AWS4-ECDSA-P256-SHA256. The key is derived from the AWS access key. • I reimplemented aws-whoami in <a href="https://twitter.com/hashtag/golang" target="_blank">#golang</a> (from python), so it's a plain binary rather than needing a pip install. It's tidier than plain `aws sts get-caller-identity` (and additionally gets the account name!)—and of course miles better than `aws s3 ls` <a href="https://t.co/dWOY8z2VBI" target="_blank">github.com/benkehoe/aws-w…</a> • It's the same with code. Accepting that there's lots of text that needs to exist in your program but will be written by AI, is just categorically worse than evolving programming languages to allow more terse expression • EC2 naming explained • Amazon Athena quietly got a lot better — Engine version 3 • Amazon EKS now support Kubernetes version 1.25 • $300k bill after AWS account hacked! • AWS EC2 IMDS – What You Need to Know - Security Boulevard • The dangers of rogue and abandoned AWS accounts - Security Boulevard • AWS IP Ranges update for 2023-02-17 00:13:06 • AWS IP Ranges update for 2023-02-17 17:13:06

ASD Logo

27
Monday February, 2023

📣 Sponsor

ProwlerPro is the most comprehensive tool for cloud security. ProwlerPro is trusted by orgs of all sizes, and used everyday so teams can be confident in their cloud security framework.

Sign up for free today for:

  • Dashboards with actionable, direct insights for every level of detail of your security posture
  • Holistic view of your infrastructure for any AWS region
  • Answers in minutes

Use ProwlerPro to see what your first scan discovers.

🐿 In a nutshell

Announcing fwd:cloudsec 2023, the leading independent, community-driven cloud security conference. This event brings together real-world cloud security practitioners to help the community of fellow practitioners achieves world-class security in the cloud.

The conference will take place on June 12-13, 2023, in Los Angeles.

Don't miss out on this opportunity to connect with the best in cloud security.

Get your tickets now!

📊 Pool of the week

Q: Your company policies require encryption of sensitive data at rest. You are considering the possible options for protecting data while storing it at rest on an EBS data volume, attached to an EC2 instance. Which of these options would allow you to encrypt your data at rest?

🗳Answer here

Past week pool:

Q: The decision was made to place database hosts in their own VPC, and to set up VPC peering to different VPCs containing the application and web tiers. The application servers are unable to connect to the database. Which network troubleshooting steps should be taken to resolve the issue?

Answer: B (17/19 votes) 🎉

🙏 Support

Did you find AWS Security Digest newsletter enjoyable to read?

If so, why not support our next edition by becoming a sponsor?

Additionally, please feel free to share our newsletter with your friends and follow us on Twitter.

How to use granular geographic match rules with AWS WAF
Mohit MysoreFeb 22
In November 2022, AWS introduced support for granular geographic (geo) match conditions in AWS WAF. This blog post demonstrates how you can use this new feature to customize your AWS WAF implementation and improve the security posture of your protected application. AWS WAF provides inline inspection of inbound traffic at …
How to monitor and query IAM resources at scale – Part 2
Michael ChanFeb 21
In this post, we continue with our recommendations for using AWS Identity and Access Management (IAM) APIs. In part 1 of this two-part series, we described how you could create IAM resources and use them soon after for authorization decisions. We also described options for monitoring and responding to IAM …
How to monitor and query IAM resources at scale – Part 1
Michael ChanFeb 21
In this two-part blog post, we’ll provide recommendations for using AWS Identity and Access Management (IAM) APIs, and we’ll share useful details on how IAM works so that you can use it more effectively. For example, you might be creating new IAM resources such as roles and policies through automation and notice …
Top 2022 AWS data protection service and cryptography tool launches
Marta TaggartFeb 21
Given the pace of Amazon Web Services (AWS) innovation, it can be challenging to stay up to date on the latest AWS service and feature launches. AWS provides services and tools to help you protect your data, accounts, and workloads from unauthorized access. AWS data protection services provide encryption capabilities, …
internetmonitor: 4 updated actions, 2 updated resources
Feb 25
4 updated actions: GetHealthEvent (resources), ListTagsForResource (resources), TagResource (resources), UntagResource (resources); 2 updated resources: Monitor (arn), HealthEvent (arn)
ecs: 1 new action | 1 updated action
Feb 25
1 new action: DeleteTaskDefinitions (Grants permission to delete the specified task definitions by family and revision); 1 updated action: TagResource (conditions)
resiliencehub: 13 new actions
Feb 24
13 new actions: CreateAppVersionAppComponent (Grants permission to create application app component), CreateAppVersionResource (Grants permission to create application resource), DeleteAppInputSource (Grants permission to remove application input source), DeleteAppVersionAppComponent (Grants permission to delete application app component), DeleteAppVersionResource (Grants permission to delete application resource), DescribeAppVersion (Grants permission to describe application version), DescribeAppVersionAppComponent (Grants …
__steele
Aidan W Steele @__steele

I published a blog post (and PoC CLI) describing how the new Systems Manager Default Host Management Configuration (what a mouthful) provides a new way to pass an IAM role to all EC2 instances in your account+region - even those without instance profiles.

awsteele.com/blog/2023/02/2…

33Feb 21 · 12:21 AM
0xdabbad00
Scott Piper @0xdabbad00

I am in constant awe of Aidan's ability to quickly jump onto a new feature, figure out how it works, develop a new tool that uses that, write a blog post, and in this case communicate findings to AWS security and create a diagram! This was 75 hours from announcement to all this!

__steele
Aidan W Steele @__steele

I published a blog post (and PoC CLI) describing how the new Systems Manager Default Host Management Configuration (what a mouthful) provides a new way to pass an IAM role to all EC2 instances in your account+region - even those without instance profiles.

awsteele.com/blog/2023/02/2…

10Feb 21 · 4:37 AM
bradgeesaman
Brad Geesaman @bradgeesaman

It’s not S3 ransomware unless it comes from the global region of AWS. Otherwise, it’s just “sparkling bucket encryption events”.

24Feb 25 · 3:53 PM
clintgibler
Clint Gibler @clintgibler

🗒️ @owasp Kubernetes Top 10

Broken down into 3 categories in order of likelihood:
1️⃣ Misconfigurations
2️⃣ Lack of visibility
3️⃣ Vulnerability management

Risks, mitigations, and lots of relevant tools

By @sysdig

sysdig.com/blog/top-owasp…

29Feb 22 · 9:00 PM
bjohnso5y
Brigid Johnson @bjohnso5y

Managing IAM resources or building security solutions to monitor them. You will want to read these two blog posts on everything IAM APIs👇

12Feb 22 · 5:00 PM
fwdcloudsec
fwd:cloudsec @fwdcloudsec

🎫 Ticket date announcement! 🎫

fwd:cloudsec tickets will be on sale in two batches on Feb 27 11:59AM ET and Feb 27 11:59PM ET!

No inflation here… tickets will continue to be $100 this year.

eventbrite.com/e/556255303587/

22Feb 24 · 11:33 PM
__steele
Aidan W Steele @__steele

AWS APIs now have at least three methods (let me know which ones I'm missing!) of authentication by asymmetric crypto:

1. SigV4A uses the `Authorization` header with algorithm AWS4-ECDSA-P256-SHA256. The key is derived from the AWS access key.

7Feb 21 · 12:10 AM
ben11kehoe
Ben Kehoe @ben11kehoe

I reimplemented aws-whoami in #golang (from python), so it's a plain binary rather than needing a pip install. It's tidier than plain `aws sts get-caller-identity` (and additionally gets the account name!)—and of course miles better than `aws s3 ls`
github.com/benkehoe/aws-w…

5Feb 21 · 2:35 AM
ben11kehoe
Ben Kehoe @ben11kehoe

It's the same with code. Accepting that there's lots of text that needs to exist in your program but will be written by AI, is just categorically worse than evolving programming languages to allow more terse expression

5Feb 20 · 6:18 PM
$300k bill after AWS account hacked!

A few months ago my company started moving into building tech. We are fairly new to the tech game, and brought in some developers of varying levels.

Soon after we started, one of the more junior developers pushed live something that seems to have had some AWS keys attached to …

  • 🖊️ Don't miss out on the latest industry insights - stay ahead of the game by subscribing
  • 📢 Gain visibility for your brand by sponsoring our content
  • 💌 If you have any suggestions for future topics, let us know