SRE Weekly Issue #265
📖 [The CloudSecList] Issue 82
[tl;dr sec] #78 - Scaling Threat Modeling at Segment, Bootstrapping vs VCs
AWS Notification Message
Amazon GuardDuty Now Available in AWS Asia Pacific (Osaka) Region
https://aws.amazon.com/about-aws/whats-new/2021/04/amazon-guardduty-now-available-in-aws-asia-pacific-osaka-region/
IAM Access Analyzer makes it easier to implement least privilege permissions by generating IAM policies based on access activity
Amazon Macie now available in AWS Asia Pacific (Osaka) Region
https://aws.amazon.com/about-aws/whats-new/2021/04/amazon-macie-now-available-in-aws-asia-pacific-osaka-region/
Auto Scaling - 3 new 2 updated methods
Amazon Lookout for Equipment - 22 new methods
How to set up a two-way integration between AWS Security Hub and ServiceNow
IAM Access Analyzer makes it easier to implement least privilege permissions by generating IAM policies based on access activity
Audit companion for the AWS PCI DSS Quick Start
AWS Verified, episode 4: How Lockheed Martin embeds security

A positive security culture sets your business up for continuous progress. Check out this @WSJ article for more of @AWSSecurityInfo’s thinking on this: partners.wsj.com/aws/reinventin…



🍪IAM Access Analyzer has a new treat for all you permission setters out there in #AWS land.🍪Now, Access Analyzer generates policies based on your CloudTrail activity. (1/11)
amzn.to/3wzIJlR



🌩️ #AWS CTF - happening now!
Put your cloud skills to the test in @Hacker0x01's first-ever AWS CTF, running today through April 12th
Learn how to:
* Escalate privileges through SSRF
* Elevate your access by exploiting misconfigurations of AWS services
hackerone.com/hack-alongside…



☁️ KICS
Another static analysis tool for infrastructure as code
Supports:
* Terraform
* Kubernetes
* Docker
* CloudFormation
* Ansible
* Helm
github.com/Checkmarx/kics



It's now been 218 days since this was reported to AWS (172 days since public). Is AWS ever going to fix this? This is their side of the shared responsibility model.

I recently found a bug in the AWS API that allows you to enumerate certain permissions for a role without logging to CloudTrail. It affects 645 actions in 40 AWS services. In this thread I'll provide a short tl;dr.
frichetten.com/blog/aws-api-e…



🧵Discovered something interesting. AWS released two new fields in the CloudTrail logs earlier this year (in Jan '21):
* sessionCredentialFromConsole
* tlsDetails
The latter shows whether or not an event originated from an AWS Console session.
Docs: docs.aws.amazon.com/awscloudtrail/…



Cloudsplaining 0.4.0 is now released! It supports scanning multiple AWS accounts for excessive AWS IAM privileges in a single command.
You just edit a YAML file that specifies the AWS accounts, and run the `scan-multi-account` command. 😀
Documentation: cloudsplaining.readthedocs.io/en/latest/user…



1/ 📣📣📣👉🏾 Federating with AWS IAM vs AWS SSO: let’s clear up a misconception on federating into AWS accounts. You can federate directly from your IdP to each AWS account via the AWS IAM service. @AWSIdentity



Regarding that Facebook scrape: I'm surprised it took this long to blow up. I tried reporting this to Facebook 7 years ago and the response was basically "working as designed".
I was able to query ~70K phone numbers a minute. As high as 20% hit rate in NYC area codes.




Hey check out my latest blog on SMTP abuse in AWS
crowdstrike.com/blog/how-to-ha…


I built a tool which automatically suggests least-privilege IAM policies
I'm building iam-zero, a tool which detects IAM issues and suggests least-privilege policies.
It uses an instrumentation layer to capture AWS API calls made in botocore
and other AWS SDKs (including the official CLI) and send alerts to a collector - similar to how Sentry, Rollbar, etc capture errors in …
Lessons I learnt about S3 presigned URLs
While writing an IAM Policy to allow a Lambda Function to create pre-signed S3 URLs I was struggling to find the right permissions for getSignedUrl action. 🙇♀️
Then I remembered anyone with valid credentials can create a pre-signed URL!
Anyone with valid AWS security credentials can create a pre-signed URL. …
IAM Access Analyzer makes it easier to implement least privilege permissions by generating IAM policies based on access activity
You can now use IAM Access Analyzer to generate fine-grained policies, based on your access activity in your AWS CloudTrail logs. When you request a policy, IAM Access Analyzer gets to work and identifies your activity from CloudTrail logs to generate a policy. The generated policy grants only the required …
Help Wanted: Cloud-based WAF testing
Hello All,
I am gathering some information for Cloud-based WAF testing and validation. My company is in the testing phase for a major vendor, and we're seeking input from industry professionals on which providers they would like to see in the WAF testing.
The end goal is to provide public …
- 🖊️ This newsletter was fwd to you? Subscribe here
- 💌 Want to suggest new content: contact me or reply to this email
- ⚡️ Powered by Mailbrew