
☁️ AWS Top 10 by @security_contra
Free labs focused on understanding & fixing, not just finding & exploiting
* S3 directory traversal
* Lambda command injection
* Misconfigured reverse proxy
* + more
#cloudsecurity
application.security/free/kontra-aw…

🧙♂️Hacking G Suite: The Power of Dark Apps Script Magic
Awesome @defcon talk by @IAmMandatory covering
* Phishing
* Persistence
* Lateral movement
* Bypassing protections like U2F and OAuth app
* more
#redteam #Pentesting
youtube.com/watch?v=6AsVUS…

A super comprehensive (160+ pages!) open source #AWS S3 threat model document from the team @trustoncloud. It's incredible how many attack vectors can exist for just a single service.
#cloud #security
trustoncloud.com/the-last-s3-se…

🏞️Soooo...remember when we pumped up Access Analyzer to generate policies based on access activity from CloudTrail? Well, now you can generate those same fine-grained policies using your organizational trail. 🏞️ (1/10)

Why doesn't AWS just add this condition themselves!? They are already changing the policy for you. Why would they knowingly configure an insecure policy!? 😭
Here is a confused deputy problem, deployed by AWS, to allow messing with CloudTrail log ingestion pipelines.🤦♂️

Changed functionality - When you configure a trail to send notifications to Amazon SNS, CloudTrail adds a policy statement to your SNS topic access policy that allows CloudTrail to send content to an SNS topic. As a security best practice, we recommend a… docs.aws.amazon.com/awscloudtrail/…

This fixes the biggest limitation of Access Analyzer policy generation that previously it only worked when the principal and CloudTrail logs were local to an S3 in the same account. Now you can use logs from an S3 stored elsewhere. An obvious and badly needed improvement.

IAM Access Analyzer helps you generate IAM policies based on access activity found in your organization trail
In April 2021, IAM Access Analyzer added policy generation to help you create fine-grained policies based on AWS CloudTrail activity store... aws.amazon.com/about-aws/what…

1/ 📣 Identity and Access Management is critical to security 🔐. Check out what Karen Haberkorn, Director of Product Management for AWS Identity, has to say about how AWS helps you manage and secure your critical data and resources in AWS! 11:45am PT / 2:45pm ET @AWSIdentity twitter.com/AWSSecurityInf…

📣 Join #AWS security leaders online for #reInforce! 🛡✨☁️ Catch the livestream of @StephenSchmidt's keynote + leadership sessions on August 24th! 📌 Register here: go.aws/3srwOF4 👈 #AWS #CloudComputing #CloudSecurity #Developer


📣 Ok, announcement time: I've started working on a new project focused on helping individual contributors/engineers get their work recognized and progress in their careers. More on this later this week!

Here it is what I promised with Prowler 2.5. Enjoy “dashboarding”! …sight-security-dashboard.workshop.aws

Prowler 2.5.0 - Senjutsu 🔥🔥🤘github.com/toniblyx/prowl…
Please can someone assist me on an auto remediation strategy to bring our non compliant controls into compliance with findings from AWS Config and Security Hub which are all based on the CIS Benchmark. There are tons of S3 buckets for instance and putting on the appropriate controls manually would …
- 🖊️ This newsletter was fwd to you? Subscribe here
- 💌 Want to suggest new content: contact me or reply to this email
- ⚡️ Powered by Mailbrew
- 🐦 Follow me on Twitter or hire me.