SRE Weekly Issue #267
📖 [The CloudSecList] Issue 84
[tl;dr sec] #80 - Celleb-fight me, Hardening CI Infrastructure
Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles
AWS Elemental MediaPackage - 4 updated methods
Amazon ElastiCache - 15 updated methods
Amazon Forecast Service - 3 updated methods
AWS SecurityHub - 3 new 3 updated methods
How to use AWS Secrets & Configuration Provider with your Kubernetes Secrets Store CSI driver
Whitepaper available: Classic intrusion analysis frameworks for AWS environments
Review last accessed information to identify unused EC2, IAM, and Lambda permissions and tighten access for your IAM roles

🔥 Continuous recon and vulnerability assessment using GitHub Actions @pdiscoveryio
Domain
➡️ SubFinder - subdomain enum
➡️ Naabu - port scan
➡️ httpx - probe HTTP
➡️ nuceli - find CVEs
➡️ Slack/Discord/Telegram alerts
#recon #bugbountytips
github.com/projectdiscove…



1/ 🚀🚀🚀IAM actions last accessed by users or roles your AWS account: in addition to S3 mgmt actions, you now can see when Amazon EC2, AWS IAM, and AWS Lambda actions were last used! Here I can see that I just attempted a DeleteRole & DeletePolicy in the #AWSIAM service:


More goodies to make it easier to pursue least privilege security for access to AWS. Here is an overview of the approach youtu.be/xuxUL8gwKJs - today the team widened the number of services supported.



I've started working on probably the most ambitious blog post I’ve written so far. This time I’m going to publish a post containing a roadmap template for #CloudSecurity teams, created with knowledge gathered over the past few years and aligned with the @cloudsa CCM



The other day I needed to hide an AWS account ID for a demo using the CLI, but couldn't find anything to help me do that - so I decided to write something myself!
Replace arbitrary strings or patterns in your console output on demand with censor-shell 🤐
github.com/iann0036/censo…




🛡️ Defend the Core: #Kubernetes Security at Every Layer
Nice overview by @jimmesta, covering best practices at the following layers:
* Kernel
* Container
* Workload (pod)
* Networking
* Nodes
* Cluster components
thenewstack.io/defend-the-cor…



🎬 And action! 🎬 IAM, EC2, and Lambda actions to be exact. You can now review action last accessed information for these services amzn.to/3sGzxcf (1/9).



There is now a AWSCompromisedKeyQuarantineV2. Looks like the primary change from V1 is stopping people from deleting S3 buckets and objects. 😮 I assumed AWS saw a problem of someone exfilling data or maybe encrypting it for ransom, but just deleting it? Yikes.

AmazonDevOpsGuruServiceRolePolicy AWSCompromisedKeyQuarantineV2... github.com/z0ph/aws_manag…



Published a beta version of Pacu to pip. Follow the directions here (github.com/RhinoSecurityL…). Interested in testing it? Feedback welcome!


AWS CLI --query option seems underappreciated
Full disclaimer, I wrote this article. Upon discovery of the --query
option, I decided to research various techniques using the JMESPath syntax. My organization and some of my personal clients use `jq` to parse the AWS CLI command output.
I figured I'd write an article surfacing the research / methods …
AWSLambdaFullAccess policy is now gone, new policy called AWSLambda_FullAccess
Hi guys and girls,
My colleague just noticed this in our organization after we had some issues with applying some changes to a role, AWS decided a _ was much better for AWSLambdaFullAccess. If any of your applications are using the old naming convention for this policy it will refer …
UI/UX: Table consistency request for the AWS team
Maybe this is just me, but I would like to raise my hand and point out that the tables across all the AWS Console are very inconsistent. The sorting and with adjustment of columns is not consistent across all the AWS services that display data with tables.
I think it …
New Tool To Find & Fix Vulnerabilities in GSuite, O365, AWS and more
Hi Everyone,
There is a new tool that can help you to discover misconfiguration in your organization's cloud apps environments.
The onboarding is super easy (it took me less than 3min) and it checks for dozens of checks like:
- MFA / Strong Password Enforcement
- Public Files / Calendars / Buckets …
- 🖊️ This newsletter was fwd to you? Subscribe here
- 💌 Want to suggest new content: contact me or reply to this email
- ⚡️ Powered by Mailbrew