Best of breed Sec Newsletters:
- TLDRsec.com from @clintgibler
- CloudSecList from @lancinimarco
- securitynewsletter.co from @dietervds
SRE Weekly Issue #269
📖 [The CloudSecList] Issue 86
[tl;dr sec] #82 - Supply Chain Security, Career Resources
Introducing IAM Access Control for Apache Kafka on Amazon MSK
Managed Streaming for Kafka - 4 updated methods
Amazon Import/Export Snowball - 3 new 7 updated methods
Amazon Simple Systems Manager (SSM) - 6 updated methods
Amazon Kinesis Analytics - 1 new 8 updated methods
How to monitor expirations of imported certificates in AWS Certificate Manager (ACM)
Nine additional AWS cloud service offerings authorized by DISA
Use ACM Private CA for Amazon API Gateway Mutual TLS
IAM makes it easier for you to manage permissions for AWS services accessing your resources
IAM 10th Anniversary: Top Recommendations for Working with IAM from Our AWS Heroes – Part 1 | Amazon Web Services



Top Recommendations for Working with IAM from Our AWS Heroes – Part 3: Permissions Boundaries and Conditions | Amazon Web Services




“We’ve recently upgraded our security, please create a new password”
No, you got hacked and don’t want to be honest about it 🙄



🎂Y’all might have heard it’s IAM 10th Birthday. 🎂IAM is officially in the double digits. There are so many reasons to celebrate IAM on it’s special day. Here is my list. (1/11)



#awswishlist Stop using IAM user access keys in blog posts.

New Developer post by iliana etaoin:
A New AWS SDK for Rust – Alpha Launch
aws.amazon.com/blogs/develope…



New AWS architecture icons day 🧑🎨
Available at aws.amazon.com/architecture/i…




🔥 New from @pdiscoveryio
🛠️Interactsh: Open source out-of-band testing tool
* Can emulate HTTP, DNS, & SMTP w/ wildcards enabled. Nuclei integration coming
blog.projectdiscovery.io/interactsh-rel…
🏃Exploiting Race conditions w/ @pdnuclei
blog.projectdiscovery.io/exploiting-rac…
#bugbountytips #WebSecurity



Happy 10th birthday, AWS IAM! Thanks to all of the team members over the years that contributed, and thanks to all of the AWS customers who have used it and provided feedback! aws.amazon.com/blogs/aws/happ… @AWSIdentity Looking forward to the next 10...



A few wks ago I started researching all the ways data can be shared between AWS accts as part of a post I'm writing. 2 wks later and I'm still discovering new ways. Suffice it to say - the security "boundary" that #AWS accounts offer is ridiculous easy to break. #cloud #security



Ten years ago, AWS Identity and Access Management (IAM) was born. Reflections on what's changed in the last decade: linkedin.com/pulse/decade-s… @AWSIdentity



The existence of aws:PrincipalIsAWSService, aws:ViaAWSService, aws:CalledVia, and related condition keys is chaos.

The AWS Security, Identity & Compliance Blog #AWSSecurity
aws.amazon.com/blogs/security…
By: Ilya Epshteyn and Harsha Sharma



Moar Dependency Confusion Resources 🧵
⚒️ DazedAndConfused: helps determine your exposure
Currently works on 12+ types of dependency files (more than any other tool I've seen)
Also has support for scanning GitHub and GitLab servers
github.com/salesforce/Daz…


Big Data encryption or other security tools in the cloud
What tools do companies use for Big Data protection in the cloud? We want securely collect, aggregate and analyze (using Apache Spark) text files and video streams from our end users. What is the best way to protect their data without degrading cloud speed? Do any tools enable arbitrary access, …
- 🖊️ This newsletter was fwd to you? Subscribe here
- 💌 Want to suggest new content: contact me or reply to this email
- ⚡️ Powered by Mailbrew