Security Newsletter - Passwordstate password manager hacked. Emotet removing itself since Sunday. QNAP ransomware with 7zip. • SRE Weekly Issue #267 • 📖 [The CloudSecList] Issue 84 • [tl;dr sec] #80 - Celleb-fight me, Hardening CI Infrastructure • Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles • AWS Elemental MediaPackage - 4 updated methods • Amazon ElastiCache - 15 updated methods • Amazon Forecast Service - 3 updated methods • AWS SecurityHub - 3 new 3 updated methods • How to use AWS Secrets & Configuration Provider with your Kubernetes Secrets Store CSI driver • Whitepaper available: Classic intrusion analysis frameworks for AWS environments • Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles • 🔥 Continuous recon and vulnerability assessment using GitHub Actions <a href="https://twitter.com/pdiscoveryio" target="_blank">@pdiscoveryio</a> Domain ➡️ SubFinder - subdomain enum ➡️ Naabu - port scan ➡️ httpx - probe HTTP ➡️ nuceli - find CVEs ➡️ Slack/Discord/Telegram alerts <a href="https://twitter.com/hashtag/recon" target="_blank">#recon</a> <a href="https://twitter.com/hashtag/bugbountytips" target="_blank">#bugbountytips</a> <a href="https://t.co/mMGUT9EY1l" target="_blank">github.com/projectdiscove…</a> • 1/ 🚀🚀🚀IAM actions last accessed by users or roles your AWS account: in addition to S3 mgmt actions, you now can see when Amazon EC2, AWS IAM, and AWS Lambda actions were last used! Here I can see that I just attempted a DeleteRole &amp; DeletePolicy in the <a href="https://twitter.com/hashtag/AWSIAM" target="_blank">#AWSIAM</a> service: • I've started working on probably the most ambitious blog post I’ve written so far. This time I’m going to publish a post containing a roadmap template for <a href="https://twitter.com/hashtag/CloudSecurity" target="_blank">#CloudSecurity</a> teams, created with knowledge gathered over the past few years and aligned with the <a href="https://twitter.com/cloudsa" target="_blank">@cloudsa</a> CCM • The other day I needed to hide an AWS account ID for a demo using the CLI, but couldn't find anything to help me do that - so I decided to write something myself! Replace arbitrary strings or patterns in your console output on demand with censor-shell 🤐 <a href="https://t.co/UDdK8BdKSC" target="_blank">github.com/iann0036/censo…</a> • Today I am 0x20 years old 🥳 • 🛡️ Defend the Core: <a href="https://twitter.com/hashtag/Kubernetes" target="_blank">#Kubernetes</a> Security at Every Layer Nice overview by <a href="https://twitter.com/jimmesta" target="_blank">@jimmesta</a>, covering best practices at the following layers: * Kernel * Container * Workload (pod) * Networking * Nodes * Cluster components <a href="https://t.co/mDpFbrKcVh" target="_blank">thenewstack.io/defend-the-cor…</a> • 🎬 And action! 🎬 IAM, EC2, and Lambda actions to be exact. You can now review action last accessed information for these services <a href="https://t.co/dhldyBpAQC" target="_blank">amzn.to/3sGzxcf</a> (1/9). • Cool CLI arg 😄 • There is now a AWSCompromisedKeyQuarantineV2. Looks like the primary change from V1 is stopping people from deleting S3 buckets and objects. 😮 I assumed AWS saw a problem of someone exfilling data or maybe encrypting it for ransom, but just deleting it? Yikes. • Published a beta version of Pacu to pip. Follow the directions here (<a href="https://t.co/1VwBtnnGfa" target="_blank">github.com/RhinoSecurityL…</a>). Interested in testing it? Feedback welcome! • Netflix Open Sources ConsoleMe to Manage Permissions and Access on AWS • Amazon RDS for PostgreSQL Integrates with AWS Lambda • AWS CLI --query option seems underappreciated • AWSLambdaFullAccess policy is now gone, new policy called AWSLambda_FullAccess • UI/UX: Table consistency request for the AWS team • Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective • Leaky John Deere API’s: Serious PII & Food Supply Chain Vulnerabilities Discovered In John Deere Website • New Tool To Find & Fix Vulnerabilities in GSuite, O365, AWS and more • Lacework expands native security support across AWS to protect cloud changes and workloads - Help Net Security • Lacework Expands Security, Visibility and Automation Across Amazon Web Services - StreetInsider.com • Trend Micro launches cloud security platform on AWS Marketplace - DataCenterNews North America
26
Monday April, 2021

Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles

Apr 19
IAM helps customers with capabilities to analyze access and achieve least privilege. When you are working on new permissions for your teams, you can use IAM Access Analyzer policy generation to create a policy based on your access activity and set fine-grained permissions. To analyze and refine existing permissions, you …

AWS Elemental MediaPackage - 4 updated methods

Apr 23
Add support for Widevine DRM on CMAF origin endpoints. Both Widevine and FairPlay DRMs can now be used simultaneously, with CBCS encryption.

Amazon ElastiCache - 15 updated methods

Apr 22
This release introduces log delivery of Redis slow log from Amazon ElastiCache.

Amazon Forecast Service - 3 updated methods

Apr 22
This release adds EstimatedTimeRemaining minutes field to the DescribeDatasetImportJob, DescribePredictor, DescribeForecast API response which denotes the time remaining to complete the job IN_PROGRESS.

AWS SecurityHub - 3 new 3 updated methods

Apr 22
Replaced the term "master" with "administrator". Added new actions to replace AcceptInvitation, GetMasterAccount, and DisassociateFromMasterAccount. In Member, replaced MasterId with AdministratorId.

How to use AWS Secrets & Configuration Provider with your Kubernetes Secrets Store CSI driver

Tracy PierceApr 22
April 23, 2021: We’ve updated the commands in Steps 1 and 5 and in the “Additional Features” section. AWS Secrets Manager now enables you to securely retrieve secrets from AWS Secrets Manager for use in your Amazon Elastic Kubernetes Service (Amazon EKS) Kubernetes pods. With the launch of AWS Secrets …

Whitepaper available: Classic intrusion analysis frameworks for AWS environments

Tim RainsApr 21
Amazon Web Services (AWS) has released a new whitepaper, Classic intrusion analysis frameworks for AWS environments, to help organizations plan and implement a classic intrusion analysis framework for AWS environments. This whitepaper provides context that will help you understand how such frameworks are used and shows you, in detail, how …

Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles

Mathangi RameshApr 20
AWS Identity and Access Management (IAM) helps customers analyze access and achieve least privilege. When you are working on new permissions for your team, you can use IAM Access Analyzer policy generation to create a policy based on your access activity and set fine-grained permissions. To analyze and refine existing …
clintgibler
Clint Gibler @clintgibler

🔥 Continuous recon and vulnerability assessment using GitHub Actions @pdiscoveryio

Domain
➡️ SubFinder - subdomain enum
➡️ Naabu - port scan
➡️ httpx - probe HTTP
➡️ nuceli - find CVEs
➡️ Slack/Discord/Telegram alerts

#recon #bugbountytips

github.com/projectdiscove…

56Apr 20 · 5:00 PM
mchancloud
Michael Chan @mchancloud

1/ 🚀🚀🚀IAM actions last accessed by users or roles your AWS account: in addition to S3 mgmt actions, you now can see when Amazon EC2, AWS IAM, and AWS Lambda actions were last used! Here I can see that I just attempted a DeleteRole & DeletePolicy in the #AWSIAM service:

jim_scharf
Jim Scharf @jim_scharf

More goodies to make it easier to pursue least privilege security for access to AWS. Here is an overview of the approach youtu.be/xuxUL8gwKJs - today the team widened the number of services supported.

27Apr 20 · 7:28 PM
lancinimarco
Marco Lancini @lancinimarco

I've started working on probably the most ambitious blog post I’ve written so far. This time I’m going to publish a post containing a roadmap template for #CloudSecurity teams, created with knowledge gathered over the past few years and aligned with the @cloudsa CCM

6Apr 19 · 10:04 PM
iann0036
Ian Mckay @iann0036

The other day I needed to hide an AWS account ID for a demo using the CLI, but couldn't find anything to help me do that - so I decided to write something myself!

Replace arbitrary strings or patterns in your console output on demand with censor-shell 🤐

github.com/iann0036/censo…

7Apr 22 · 5:43 PM
clintgibler
Clint Gibler @clintgibler

🛡️ Defend the Core: #Kubernetes Security at Every Layer

Nice overview by @jimmesta, covering best practices at the following layers:
* Kernel
* Container
* Workload (pod)
* Networking
* Nodes
* Cluster components

thenewstack.io/defend-the-cor…

10Apr 21 · 1:00 AM
bjohnso5y
Brigid Johnson @bjohnso5y

🎬 And action! 🎬 IAM, EC2, and Lambda actions to be exact. You can now review action last accessed information for these services amzn.to/3sGzxcf (1/9).

14Apr 22 · 1:59 AM
0xdabbad00
Scott Piper @0xdabbad00

There is now a AWSCompromisedKeyQuarantineV2. Looks like the primary change from V1 is stopping people from deleting S3 buckets and objects. 😮 I assumed AWS saw a problem of someone exfilling data or maybe encrypting it for ransom, but just deleting it? Yikes.

mamip_aws
MAMIP - Monitor AWS Managed IAM Policies Changes @mamip_aws

AmazonDevOpsGuruServiceRolePolicy AWSCompromisedKeyQuarantineV2... github.com/z0ph/aws_manag…

6Apr 22 · 2:35 AM
RhinoSecurity
Rhino Security Labs @RhinoSecurity

Published a beta version of Pacu to pip. Follow the directions here (github.com/RhinoSecurityL…). Interested in testing it? Feedback welcome!

12Apr 22 · 1:53 AM

AWS CLI --query option seems underappreciated

Full disclaimer, I wrote this article. Upon discovery of the --query option, I decided to research various techniques using the JMESPath syntax. My organization and some of my personal clients use `jq` to parse the AWS CLI command output.

I figured I'd write an article surfacing the research / methods …

AWSLambdaFullAccess policy is now gone, new policy called AWSLambda_FullAccess

Hi guys and girls,

My colleague just noticed this in our organization after we had some issues with applying some changes to a role, AWS decided a _ was much better for AWSLambdaFullAccess. If any of your applications are using the old naming convention for this policy it will refer …

UI/UX: Table consistency request for the AWS team

Maybe this is just me, but I would like to raise my hand and point out that the tables across all the AWS Console are very inconsistent. The sorting and with adjustment of columns is not consistent across all the AWS services that display data with tables.

I think it …

New Tool To Find & Fix Vulnerabilities in GSuite, O365, AWS and more

Hi Everyone,

There is a new tool that can help you to discover misconfiguration in your organization's cloud apps environments.

The onboarding is super easy (it took me less than 3min) and it checks for dozens of checks like:

  1. MFA / Strong Password Enforcement
  2. Public Files / Calendars / Buckets …