Security Newsletter - Europol takes down DarkMarket. Joker's Stash carding site stops. €10 million GDPR fine for video surveillance. • Amazon Cognito Identity Pools enables using user attributes from identity providers for access control to simplify permissions management in AWS • Best practices and advanced patterns for Lambda code signing • How to approach threat modeling • My 3rd annual "AWS Security Maturity Roadmap" is out! This is my guide for the steps to securely run on AWS. See what changed this year and download it at <a href="https://t.co/ziK34RG5vU" target="_blank">summitroute.com/blog/2021/01/1…</a> • Table top exercise: an attacker has compromised the S3 bucket used to store CFN templates as part of your build process and is overwriting them with similar templates with an injected cross-account IAM admin role between the "upload" and "create-stack" steps. How do you detect? • Haha! 🤣🤣 Thank you <a href="https://twitter.com/shehackspurple" target="_blank">@shehackspurple</a>, your newsletter made me laugh and put a smile on my face 👇 • The re:Invent talk by <a href="https://twitter.com/JPoForenso" target="_blank">@JPoForenso</a> "Instance containment techniques for effective incident response" highlights the most confusing IR concept on AWS, that Security Group changes may not work how you expect. See 16:52 <a href="https://t.co/lOXjKXZ4I0" target="_blank">virtual.awsevents.com/media/0_ony0og…</a> • From a Slack team re: AWS GuardDuty Instance Credential Exfiltration Context tldr: Creds stolen from the EC2 IMDS _won't_ trigger this finding if they are used from another EC2 instance, even in a diff AWS account This gives me hope we should be seeing that change soon :D • On Jan 21st we will be delivering a re:cap on everything <a href="https://twitter.com/hashtag/AWSreInvent" target="_blank">#AWSreInvent</a> 🔥 Come join me to recap on all the exciting launches and announcements! 🚀 <a href="https://t.co/quN0aVaykU" target="_blank">bit.ly/38Ekr00</a> • 🐋 How Netflix secures their containers using User Namespaces ("rootless containers") Great overview of the problem space + a discussion of how their architecture has changed over time by <a href="https://twitter.com/fabiokung" target="_blank">@fabiokung</a> <a href="https://twitter.com/sargun" target="_blank">@sargun</a> <a href="https://twitter.com/aspyker" target="_blank">@aspyker</a> <a href="https://twitter.com/heliousc6" target="_blank">@heliousc6</a> <a href="https://twitter.com/anwleung" target="_blank">@anwleung</a> et al <a href="https://t.co/7G0V0A83Pc" target="_blank">netflixtechblog.com/evolving-conta…</a> • Recently <a href="https://twitter.com/hashtag/AWSSSO" target="_blank">#AWSSSO</a> and now <a href="https://twitter.com/hashtag/AmazonCognito" target="_blank">#AmazonCognito</a> supports ABAC! Now you can use attributes from your social provider to determine permissions to access resources. More on ABAC: <a href="https://t.co/uavWUc67t9" target="_blank">docs.aws.amazon.com/IAM/latest/Use…</a> • This will be useful next time a leader tells me to put on my "think big hat" ...a gift from my parents basement. Maybe they will find a AWS service down there too?! 🤷 • If you don’t think you’re already in the cloud... have someone from finance go see if people have charged AWS to their corporate Amex cards. You’d be surprised. Also a great way to track down potential shadow IT <a href="https://t.co/P4XMgie6Tm" target="_blank">twitter.com/AccidentalCISO…</a> • Today is my first birthday during COVID times. For all that celebrated last year, any ideas on how to celebrate? • wat • A yearly post I look forward to reading top-to-bottom every year. Definitely worth a read if you're building or supporting anything in <a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a>. <a href="https://twitter.com/hashtag/cloud" target="_blank">#cloud</a> <a href="https://twitter.com/hashtag/security" target="_blank">#security</a> • Tell me you work in cloud security without telling me you work in cloud security ☁️ 💥 • <a href="https://twitter.com/matthewdfuller" target="_blank">@matthewdfuller</a> Do I have to detect or just avoid compromise? If it’s the latter, I have versioning enabled on the bucket and append ?versionId=xxx to the TemplateURL parameter. • Cloud Security Engineer technical interview? • CloudFormation now has more resource types than Terraform (664 CFN - 654 TF) • Twitter taps AWS for its latest foray into the public cloud • Amazon EC2 API now supports Internet Protocol Version 6 (IPv6) • How to Enable Logging on Every AWS Service in Existence (Circa 2021) • How AWS is helping to secure internet routing | Amazon Web Services
18 Monday
January, 2021

Welcome to AWS Security Digest.

This weekly newsletter is crafted by zoph using Mailbrew.

Security Newsletter - Europol takes down DarkMarket. Joker's Stash carding site stops. €10 million GDPR fine for video surveillance.

Dieter Van der StockJan 18
Hi everyone! I hope you're all doing well, keeping healthy and sane. We're going into our fifth week of school lockdown, being at home full time with a baby and …

Amazon Cognito Identity Pools enables using user attributes from identity providers for access control to simplify permissions management in AWS

Amazon Cognito Identity Pools now enables you to use attributes from social and corporate identity providers to make access control decisions and simplify permissions management to AWS resources.


https://aws.amazon.com/about-aws/whats-new/2021/01/amazon-cognito-identity-pools-now-enables-customers-to-use-attributes-from-identity-providers-to-simplify-permissions-management-to-aws-resources/

Best practices and advanced patterns for Lambda code signing

Cassia MartinJan 12
Amazon Web Services (AWS) recently released Code Signing for AWS Lambda. By using this feature, you can help enforce the integrity of your code artifacts and make sure that only trusted developers can deploy code to your AWS Lambda functions. Today, let’s review a basic use case along with best …

How to approach threat modeling

Darran BoydJan 12
In this post, I’ll provide my tips on how to integrate threat modeling into your organization’s application development lifecycle. There are many great guides on how to perform the procedural parts of threat modeling, and I’ll briefly touch on these and their methodologies. However, the main aim of this post …
0xdabbad00

Scott Piper

@0xdabbad00

My 3rd annual "AWS Security Maturity Roadmap" is out! This is my guide for the steps to securely run on AWS. See what changed this year and download it at summitroute.com/blog/2021/01/1…

matthewdfuller

Matt Fuller

@matthewdfuller

Table top exercise: an attacker has compromised the S3 bucket used to store CFN templates as part of your build process and is overwriting them with similar templates with an injected cross-account IAM admin role between the "upload" and "create-stack" steps. How do you detect?

clintgibler

Clint Gibler

@clintgibler

Haha! 🤣🤣 Thank you @shehackspurple, your newsletter made me laugh and put a smile on my face 👇

0xdabbad00

Scott Piper

@0xdabbad00

The re:Invent talk by @JPoForenso "Instance containment techniques for effective incident response" highlights the most confusing IR concept on AWS, that Security Group changes may not work how you expect. See 16:52 virtual.awsevents.com/media/0_ony0og…

SpenGietz

Spencer Gietzen

@SpenGietz

From a Slack team re: AWS GuardDuty Instance Credential Exfiltration

Context tldr: Creds stolen from the EC2 IMDS _won't_ trigger this finding if they are used from another EC2 instance, even in a diff AWS account

This gives me hope we should be seeing that change soon :D

steven_bryen

Steven Bryen

@steven_bryen

On Jan 21st we will be delivering a re:cap on everything #AWSreInvent 🔥

Come join me to recap on all the exciting launches and announcements! 🚀

bit.ly/38Ekr00

clintgibler

Clint Gibler

@clintgibler

🐋 How Netflix secures their containers using User Namespaces ("rootless containers")

Great overview of the problem space + a discussion of how their architecture has changed over time

by @fabiokung @sargun @aspyker @heliousc6 @anwleung et al

netflixtechblog.com/evolving-conta…

mchancloud

Michael Chan

@mchancloud

Recently #AWSSSO and now #AmazonCognito supports ABAC! Now you can use attributes from your social provider to determine permissions to access resources. More on ABAC: docs.aws.amazon.com/IAM/latest/Use…

AWSIdentity

AWS Identity

@AWSIdentity

New! #AmazonCognito Identity Pools now enables you to use attributes from social and corporate identity providers to simplify access control management and avoid constant updates to permissions. go.aws/35GXKGt

bjohnso5y

Brigid Johnson

@bjohnso5y

This will be useful next time a leader tells me to put on my "think big hat"
...a gift from my parents basement. Maybe they will find a AWS service down there too?! 🤷

kmcquade3

Kinnaird McQuade💥☁️

@kmcquade3

If you don’t think you’re already in the cloud... have someone from finance go see if people have charged AWS to their corporate Amex cards. You’d be surprised.

Also a great way to track down potential shadow IT twitter.com/AccidentalCISO…

AccidentalCISO

Accidental CISO

@AccidentalCISO

When this whole cloud thing catches on, we're going to see some serious shit.

bjohnso5y

Brigid Johnson

@bjohnso5y

Today is my first birthday during COVID times. For all that celebrated last year, any ideas on how to celebrate?

matthewdfuller

Matt Fuller

@matthewdfuller

A yearly post I look forward to reading top-to-bottom every year. Definitely worth a read if you're building or supporting anything in #AWS. #cloud #security

0xdabbad00

Scott Piper

@0xdabbad00

My 3rd annual "AWS Security Maturity Roadmap" is out! This is my guide for the steps to securely run on AWS. See what changed this year and download it at summitroute.com/blog/2021/01/1…

kmcquade3

Kinnaird McQuade💥☁️

@kmcquade3

Tell me you work in cloud security without telling me you work in cloud security ☁️ 💥

__steele

Aidan W Steele

@__steele

@matthewdfuller Do I have to detect or just avoid compromise? If it’s the latter, I have versioning enabled on the bucket and append ?versionId=xxx to the TemplateURL parameter.

Cloud Security Engineer technical interview?

Hi all!

I have a technical interview in 2 weeks and wanted to prepare for it.

Can someone share any experiences with these technical interviews? Any things that should be brushed up on?

Thanks in advanced!

CloudFormation now has more resource types than Terraform (664 CFN - 654 TF)

Twitter taps AWS for its latest foray into the public cloud

Amazon EC2 API now supports Internet Protocol Version 6 (IPv6)

How to Enable Logging on Every AWS Service in Existence (Circa 2021)

How AWS is helping to secure internet routing | Amazon Web Services