SRE Weekly Issue #285 • 📖 [The CloudSecList] Issue 102 • [tl;dr sec] 98 - Cloud Security Orienteering, Last S3 Document You’ll Need • IAM Access Analyzer helps you generate fine-grained policies that specify the required actions for more than 50 services • Amazon Elastic Compute Cloud - 2 updated methods • Amazon EMR - 3 new 1 updated methods • AWS Compute Optimizer - 1 new 6 updated methods • Amazon Elastic Compute Cloud - 1 updated methods • How to securely create and store your CRL for ACM Private CA • AWS introduces changes to access denied errors for easier permissions troubleshooting • Use IAM Access Analyzer to generate IAM policies based on access activity found in your organization trail • Apply the principle of separation of duties to shell access to your EC2 instances • autoscaling: 1 new action • compute-optimizer: 1 new action • mobiletargeting: 1 new action | 2 updated actions • cloudfront: 2 updated actions • 🔥New blog post🔥 "<a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a> privilege escalation: exploring odd features of the Trust Policy" a.k.a. how to assume an IAM role without "sts:AssumeRole" permission? <a href="https://t.co/t9oGPvQ6dl" target="_blank">rzepsky.medium.com/aws-privilege-…</a> • 📓 163 page Threat Model of <a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a> S3 by @djo_hk Covers: 1. Best practices (best security/effort ratio) 2. Onboarding for large enterprises/agencies 3. Compliance mapping to demonstrate a risk-based approach and gap analysis <a href="https://twitter.com/hashtag/cloudsecurity" target="_blank">#cloudsecurity</a> <a href="https://t.co/6esuPR9kdd" target="_blank">trustoncloud.com/the-last-s3-se…</a> • Access Denied errors are going to say why type of policy is denying them! (SCP vs resource vs IAM vs boundary vs VPC end-point, etc.) This is going to be a huge help for debugging these. • 🔥🔥 Crazy exploit on Azure Cosmos DB. “In short, the [Jupyter] notebook container allowed for a privilege escalation into other customer notebooks… As a result, an attacker could gain access to customers’ Cosmos DB primary keys… and the notebook storage access token.” • ⚛️ Electron Hardener by <a href="https://twitter.com/1Password" target="_blank">@1Password</a> A <a href="https://twitter.com/rustlang" target="_blank">@rustlang</a> library and CLI tool to harden <a href="https://twitter.com/electronjs" target="_blank">@electronjs</a> binaries against runtime behavior modifications <a href="https://t.co/MlvQwQ4PP6" target="_blank">github.com/1Password/elec…</a> • Numerous cloud vendors ask for "ReadOnly" access via a managed policy. You should think long and hard about what you're actually giving them. <a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a> <a href="https://twitter.com/hashtag/cloud" target="_blank">#cloud</a> <a href="https://twitter.com/hashtag/security" target="_blank">#security</a> <a href="https://t.co/RcKqBcDJxZ" target="_blank">posts.specterops.io/aws-readonlyac…</a> • There is now an EC2 IMDS end-point for IPv6 so there will be a new place to acquire creds beyond 169.254.169.254 at fd00:ec2::254. <a href="https://t.co/QoKUMnb4OW" target="_blank">github.com/aws/aws-sdk-go…</a> The SDK started supporting it a few weeks, but looks like now EC2 has it. <a href="https://t.co/dE7v5FRIAy" target="_blank">github.com/aws/aws-sdk-go…</a> • 😊Had a blast talking about AWS permissions at <a href="https://twitter.com/hashtag/reInforce" target="_blank">#reInforce</a> with Karen and Jesse! Least privilege is one of my favorite thing to talk about. 🥳 • Coming in October: We are making it easier to protect sensitive data by offering free MFA devices to AWS account holders and Security Awareness Training. More details <a href="https://t.co/e0ERMoPFry" target="_blank">aws.amazon.com/blogs/security…</a> • This is the holy grail for cloud adversaries: crossing the customer isolation boundaries of the service provider to access other customers' data. <a href="https://twitter.com/hashtag/azure" target="_blank">#azure</a> <a href="https://twitter.com/hashtag/cloud" target="_blank">#cloud</a> <a href="https://twitter.com/hashtag/security" target="_blank">#security</a> • A leaked Amazon document shows the maximum compensation a recruiter is allowed to offer some programmer job candidates, up to $715,400 • AWS introduces changes to access denied errors for easier permissions troubleshooting • Happy 15th Birthday Amazon EC2 • I presume you're all aware of 42.10 • IAM Zero: I built a tool which automatically suggests least-privilege IAM policies for AWS CDK infrastructure • Vulnerability in Bumble dating app reveals any user's exact location • DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover • How to start learning cloud security? • Operationalize AWS security responsibilities in the cloud - Help Net Security • AWS Introduces Security Analytics Bootstrap to Perform Security Investigations - InfoQ.com • AWS Sets MSSP Beachhead With New Security Competency - CRN
30
Monday August, 2021
IAM Access Analyzer helps you generate fine-grained policies that specify the required actions for more than 50 services
Aug 25
IAM Access Analyzer helps you achieve least privilege by generating fine-grained policies that specify the required actions for more than 50 services. In April 2021, IAM Access Analyzer added policy generation to help you create IAM policies based on your AWS CloudTrail activity. Now, we are extending policy generation to …
Amazon Elastic Compute Cloud - 2 updated methods
Aug 27
This release adds the BootMode flag to the ImportImage API and showing the detected BootMode of an ImportImage task.
Amazon EMR - 3 new 1 updated methods
Aug 27
Amazon EMR now supports auto-terminating idle EMR clusters. You can specify the idle timeout value when enabling auto-termination for both running and new clusters and Amazon EMR automatically terminates the cluster when idle timeout kicks in.
AWS Compute Optimizer - 1 new 6 updated methods
Aug 26
Adds support for 1) the AWS Graviton (AWS_ARM64) recommendation preference for Amazon EC2 instance and Auto Scaling group recommendations, and 2) the ability to get the enrollment statuses for all member accounts of an organization.
Amazon Elastic Compute Cloud - 1 updated methods
Aug 26
Support added for resizing VPC prefix lists
How to securely create and store your CRL for ACM Private CA
Tracy PierceAug 27
In this blog post, I show you how to protect your Amazon Simple Storage Service (Amazon S3) bucket while still allowing access to your AWS Certificate Manager (ACM) Private Certificate Authority (CA) certificate revocation list (CRL). A CRL is a list of certificates that have been revoked by the CA. …
AWS introduces changes to access denied errors for easier permissions troubleshooting
Gauravee GandhiAug 27
To help you more easily troubleshoot your permissions in Amazon Web Services (AWS), we’re introducing additional context in the access denied error messages. We’ll start to introduce this change in September 2021, and gradually make it available in all AWS services over the next few months. If you’re currently relying …
Use IAM Access Analyzer to generate IAM policies based on access activity found in your organization trail
Mathangi RameshAug 26
In April 2021, AWS Identity and Access Management (IAM) Access Analyzer added policy generation to help you create fine-grained policies based on AWS CloudTrail activity stored within your account. Now, we’re extending policy generation to enable you to generate policies based on access activity stored in a designated account. For …
Apply the principle of separation of duties to shell access to your EC2 instances
Vesselin TzvetkovAug 26
In this blog post, we will show you how you can use AWS Systems Manager Change Manager to control access to Amazon Elastic Compute Cloud (Amazon EC2) instance interactive shell sessions, to enforce separation of duties. Separation of duties is a design principle where more than one person’s approval is …
autoscaling: 1 new action
Aug 28
1 new action: GetPredictiveScalingForecast (retrieve the forecast data for a predictive scaling policy)
compute-optimizer: 1 new action
Aug 28
1 new action: GetEnrollmentStatusesForOrganization (get the enrollment statuses for member accounts of the organization)
mobiletargeting: 1 new action | 2 updated actions
Aug 28
1 new action: GetReports (mobiletargeting:getreports); 2 updated actions: GetApps (access), ListTagsForResource (access)
cloudfront: 2 updated actions
Aug 28
2 updated actions: CreateDistributionWithTags (access), CreateStreamingDistributionWithTags (access)
Rzepsky
Pawel Rzepa @Rzepsky

🔥New blog post🔥

"#AWS privilege escalation: exploring odd features of the Trust Policy"

a.k.a.

how to assume an IAM role without "sts:AssumeRole" permission?

rzepsky.medium.com/aws-privilege-…

clintgibler
Clint Gibler @clintgibler

📓 163 page Threat Model of #AWS S3 by @djo_hk

Covers:
1. Best practices (best security/effort ratio)
2. Onboarding for large enterprises/agencies
3. Compliance mapping to demonstrate a risk-based approach and gap analysis

#cloudsecurity

trustoncloud.com/the-last-s3-se…

0xdabbad00
Scott Piper @0xdabbad00

Access Denied errors are going to say why type of policy is denying them! (SCP vs resource vs IAM vs boundary vs VPC end-point, etc.) This is going to be a huge help for debugging these.

AWSBlogUnreal
AWS Blog Unofficial. @AWSBlogUnreal

The AWS Security, Identity & Compliance Blog #AWSSecurity
aws.amazon.com/blogs/security…
By: Guaravee Gandhi*

kmcquade3
Kinnaird McQuade💥☁️ @kmcquade3

🔥🔥 Crazy exploit on Azure Cosmos DB. “In short, the [Jupyter] notebook container allowed for a privilege escalation into other customer notebooks… As a result, an attacker could gain access to customers’ Cosmos DB primary keys… and the notebook storage access token.”

sagitz_
sagitz @sagitz_

I'm excited to share information about our research, in which we (+@nirohfeld) found a critical vulnerability in Azure Cosmos DB itself - effectively allowing malicious actors to fully compromise databases of thousands of customers. @wiz_io #ChaosDB chaosdb.wiz.io

clintgibler
Clint Gibler @clintgibler

⚛️ Electron Hardener by @1Password

A @rustlang library and CLI tool to harden @electronjs binaries against runtime behavior modifications

github.com/1Password/elec…

matthewdfuller
Matt Fuller @matthewdfuller

Numerous cloud vendors ask for "ReadOnly" access via a managed policy. You should think long and hard about what you're actually giving them.
#AWS #cloud #security
posts.specterops.io/aws-readonlyac…

0xdabbad00
Scott Piper @0xdabbad00

There is now an EC2 IMDS end-point for IPv6 so there will be a new place to acquire creds beyond 169.254.169.254 at fd00:ec2::254. github.com/aws/aws-sdk-go…
The SDK started supporting it a few weeks, but looks like now EC2 has it.
github.com/aws/aws-sdk-go…

bjohnso5y
Brigid Johnson @bjohnso5y

😊Had a blast talking about AWS permissions at #reInforce with Karen and Jesse! Least privilege is one of my favorite thing to talk about. 🥳

StephenSchmidt
stephenschmidt @StephenSchmidt

Coming in October: We are making it easier to protect sensitive data by offering free MFA devices to AWS account holders and Security Awareness Training. More details aws.amazon.com/blogs/security…

matthewdfuller
Matt Fuller @matthewdfuller

This is the holy grail for cloud adversaries: crossing the customer isolation boundaries of the service provider to access other customers' data.
#azure #cloud #security

sagitz_
sagitz @sagitz_

I'm excited to share information about our research, in which we (+@nirohfeld) found a critical vulnerability in Azure Cosmos DB itself - effectively allowing malicious actors to fully compromise databases of thousands of customers. @wiz_io #ChaosDB chaosdb.wiz.io

I presume you're all aware of 42.10

https://preview.redd.it/pd30dsv9kbk71.png?width=1906&format=png&auto=webp&s=69e421c4e7e0ce7e497f63d698953af54235b3e3

IAM Zero: I built a tool which automatically suggests least-privilege IAM policies for AWS CDK infrastructure

A few months ago I made some posts about tooling I built called IAM Zero to make least-privilege IAM policy generation easier [1][2]. Since then, I have found a co-founder and we have been working full-time on making least-privilege policies easier with our open source tools.

Most teams …

How to start learning cloud security?

Background: I have 5 years of industry experience as a front end developer. I am about to start a new job as a senior UI developer with a company that is into identity governance and cloud security. I want to learn more about cloud security in order to understand what …

buymeacoffee