SRE Weekly Issue #266
📖 [The CloudSecList] Issue 83
[tl;dr sec] #79 - Memory Safety FTW, Reference Architectures
AWS Security Hub Automated Response and, Remediation Solution adds support for AWS Foundational Security Best Practices standard
Amazon Macie adds CloudWatch logging for job status and health monitoring of sensitive data discovery jobs
AWS Identity and Access Management now makes it easier to relate a user's IAM role activity to their corporate identity
Amazon GuardDuty Now Available in AWS Asia Pacific (Osaka) Region
AWS Database Migration Service - 1 new 4 updated methods
AWS CodeStar connections - 1 updated methods
AWS MediaConnect - 5 updated methods
AWS Comprehend Medical - 1 updated methods
How to use AWS IAM Access Analyzer API to automate detection of public access to AWS KMS keys
How to relate IAM role activity to corporate identity
Optimizing cloud governance on AWS: Integrating the NIST Cybersecurity Framework, AWS Cloud Adoption Framework, and AWS Well-Architected
Generate IAM policies based on access activity
Introducing cross-Region event routing with Amazon EventBridge | Amazon Web Services




🔥 Kubernetes Pentest Methodology
1⃣Dangerous RBAC configs
cyberark.com/resources/thre…
2⃣Black box, remote attack vectors
cyberark.com/resources/thre…
3⃣Internal attack vectors (container and network), where an attacker has a foothold on one of the pods
securityboulevard.com/2019/11/kubern…



😰 Responsible for security but don't have the authority to get things fixed?
@shehackspurple: Create a "risk sign-off sheet" (w/ the vulns & business impact) and ask leadership to sign it
Either they own the risk or give you authority to fix it
microsoft.com/security/blog/…



My AWS Lambda functions beg to differ twitter.com/someinfosecguy…

The 👏 cloud 👏 is 👏 rarely 👏 cheaper 👏 than 👏 on-premise 👏



1/ 📣📣📣🎉 Auditing who did what in AWS just got a lot easier! This new #AWSIAM attribute, SourceIdentity, allows you to easily track who is responsible for performing an action, and logs their activity in AWS CloudTrail.

New! 🚀 AWS Identity & Access Management now makes it easier to relate a user's #AWSIAM role activity to their corporate identity. go.aws/3dg0e32




AWS says they didn't fix their IAM policies for the warnings from Access Analyzer policy validator because they think it's important to minimize the changes they do to policies.
But also sometimes they update them just to alphabetize them. 🙃

ReadOnlyAccess ... github.com/z0ph/aws_manag…



New sts:SourceIdentity concept when assuming roles in the SDK update today. docs.aws.amazon.com/IAM/latest/Use…



How did I not know about this? This is awesome! cc: @rmogull @hhopk @0xdabbad00 @jcfarris




This is the best article I’ve read on Kinesis streams and Lambda. Probably one of the best I’ve read on anything AWS. Well worth your time.

If you have nothing to read over the holidays, here's a suggestion for you! ☺️ The second part of my guide to #AWS #Kinesis is finally here! Spoiler alert: it is featuring #Lambda and includes some new announcements from the #reInvent2020 🌟
dev.solita.fi/2020/12/21/kin…



This is going to open up a ton of new capabilities! Ex: third-party security services will no longer need to maintain EventBridge infrastructure in every AWS region just to collect events from all regions used by end-users. #cloud #security #aws #devops
aws.amazon.com/blogs/compute/…


AWS Identity and Access Management now makes it easier to relate a user's IAM role activity to their corporate identity
Auditing who did what in AWS just got a lot easier! This new AWS IAM attribute, SourceIdentity, allows you to easily track who is responsible for performing an action, and logs their activity in AWS CloudTrail. This attribute persists even across role assumptions (role-chaining). If you're federating your IdP directly …
us-east-1 down?
Looks like there’s actually something on the status page. We can’t launch any new instances. Is anyone else seeing issues?
Have to give a nod to Reachability Analyzer.
I have 99% of my aws VPCs in terraform, but something had changed recently that was stopping packets from us-west-2 to us-east-1. I know the normal pitfalls...and then i decided to spend $.20, .10 to confirm the failure and the other to confirm it was from a certain network path. …
Amazon Managed Service for Grafana (AMG) is now available in preview to all AWS customers.
AMG supports open source Grafana version 7.5, and customers can upgrade to Grafana Enterprise with a 30-day free trial via an AWS Marketplace subscription. Grafana Enterprise enables connections to popular third party solutions including AppDynamics, DataDog, Dynatrace, MongoDB, New Relic, Oracle Database, ServiceNow, Snowflake, Splunk, and Wavefront.
https://console.aws.amazon.com/grafana/home?region=us-east-1#/
To learn …
Opportunity for those residing in India to participate in a compensated interview study about purchasing digital training products for people on your team or your organization ($250 -$300 compensation)
Hey everyone! I am part of a team that is conducting a study about digital training for cloud services & technologies. If you have ever helpedpurchase digital cloud trainings for people on your team or for your organization and are residing in India we would love to talk to …
- 🖊️ This newsletter was fwd to you? Subscribe here
- 💌 Want to suggest new content: contact me or reply to this email
- ⚡️ Powered by Mailbrew