SRE Weekly Issue #286 • 📖 [The CloudSecList] Issue 103 • [tl;dr sec] #99 - Grow Employees or Lose Them, Advantage: Defense • ACM Private CA now supports the Online Certificate Status Protocol (OCSP) • AWS Firewall Manager now supports AWS WAF log filtering • AWS Certificate Manager Private Certificate Authority - 4 updated methods • Amazon Elastic File System - 2 updated methods • Amazon FSx - 9 new 7 updated methods • Amazon Lex Model Building Service - 9 updated methods • How US federal agencies can authenticate to AWS with multi-factor authentication • Top 10 security best practices for securing data in Amazon S3 • How to improve visibility into AWS WAF with anomaly detection • Ransomware mitigation: Top 5 protections and recovery preparation actions • route53resolver: 3 updated actions • cloud9: 14 new actions | 3 updated actions • ssm: 1 updated resource | 1 removed condition • sagemaker: 1 new action • The <a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a> SDKs have just surpassed 10,000 API methods, as measured by the JS SDK data source. 2,175 of these were added in the past 12 months, which is pretty decent growth. Note the "re:Invent bump" as a major contributor. • <a href="https://twitter.com/hashtag/awswishlist" target="_blank">#awswishlist</a> Provide a public identifier for internal issues to customers, so I can say I want to +1 that issue as opposed to describing it to an AWS rep to search for and track down in their internal systems. • 📈 Top Open Source <a href="https://twitter.com/hashtag/Kubernetes" target="_blank">#Kubernetes</a> Security Tools of 2021 Survey by <a href="https://twitter.com/RedHat" target="_blank">@RedHat</a> <a href="https://t.co/7T8aGCaI3C" target="_blank">cloud.redhat.com/blog/top-open-…</a> • I haven't had a chance to check yet: is this just a typo in the documentation, or are we going to have to type it like this in our code too? Hopefully it's not like "Referer" all over again 😅 • 🍎 Summer of Fuzz: Targeting macOS Deep dive <a href="https://twitter.com/hackinthebox" target="_blank">@hackinthebox</a> talk by Jeremy Brown <a href="https://twitter.com/hashtag/Fuzzing" target="_blank">#Fuzzing</a>: * CLI/GUI Applications * Network Clients and Servers Tips: * Debugging Tools * SIP and App Sandbox * Monitoring Process Execution * Enumerating Handlers <a href="https://t.co/UlfGSWEai3" target="_blank">conference.hitb.org/hitbsecconf202…</a> • On one hand, this is very cool. On the other hand, I feel bad for the devs who will now have additional places to investigate when debugging connectivity issues between internal apps. <a href="https://t.co/NTdSS334qX" target="_blank">aws.amazon.com/blogs/aws/insp…</a> • 1/📣📣📣 Spread the word! Over the coming months, you'll start to see more informative access denied error messages when using AWS. <a href="https://twitter.com/AWSSecurityInfo" target="_blank">@AWSSecurityInfo</a> • Attack research get clicks. Defense gets contracts. Unless your business is focused on offense (and even then possibly), you should include defense guidance, otherwise someone else will get the attention of the potential customers that see your attack research. • Happy this dude starting eating. His tummy wasn't feeling too great this morning. • This is the first time I see AWS warn customers about wrongly using attribute-based conditions keys. Pretty nice to put emphasis on this mistake 👀. • New for AWS CloudFormation – Quickly Retry Stack Operations from the Point of Failure • Internal Amazon documents shed light on how company pressures out 6% of office workers (2021) • Outage • Congrats to /r/aws for hitting 180k members • Amazon Managed Grafana Is Now Generally Available with direct SSO, SAP, Jira and V8 updates • SSH Lateral Movement Cheat Sheet • Replay-based attack on Honda and Acura vehicles • Open Source CSPMs? • Genuine AWS-Certified-Security-Specialty PDF Dumps - Suggested by Pros - The African Exponent • AWS targets continuous security compliance with new service for NZ government - Reseller News • Caveonix Announces Integration with AWS Security Hub - Business Wire
6
Monday September, 2021

ACM Private CA now supports the Online Certificate Status Protocol (OCSP)
Sep 3
AWS Certificate Manager (ACM) Private Certificate Authority (CA) announces the availability of Online Certificate Status Protocol (OCSP) for distributing certificate revocation information. When establishing an encrypted TLS connection, endpoints can use OCSP to query, in near real time, if a certificate has been revoked. Thus alerting the endpoint that the …
AWS Firewall Manager now supports AWS WAF log filtering
Sep 1
AWS Firewall Manager now enables security administrators to specify which web requests to log and which requests to exclude from logs when using AWS WAF to inspect web traffic. If you use Firewall Manager security policies to centralize AWS WAF logging, you can now log only the information you want …
AWS Certificate Manager Private Certificate Authority - 4 updated methods
Sep 2
Private Certificate Authority Service now allows customers to enable an online certificate status protocol (OCSP) responder service on their private certificate authorities. Customers can also optionally configure a custom CNAME for their OCSP responder.
Amazon Elastic File System - 2 updated methods
Sep 2
Adds support for EFS Intelligent-Tiering, which uses EFS Lifecycle Management to monitor file access patterns and is designed to automatically transition files to and from your corresponding Infrequent Access (IA) storage classes.
Amazon FSx - 9 new 7 updated methods
Sep 2
Announcing Amazon FSx for NetApp ONTAP, a new service that provides fully managed shared storage in the AWS Cloud with the data access and management capabilities of ONTAP.
Amazon Lex Model Building Service - 9 updated methods
Sep 2
Lex now supports Korean (ko-KR) locale.
How US federal agencies can authenticate to AWS with multi-factor authentication
Kyle HartSep 2
This post is part of a series about how AWS can help your US federal agency meet the requirements of the President’s Executive Order on Improving the Nation’s Cybersecurity. We recognize that government agencies have varying degrees of identity management and cloud maturity and that the requirement to implement multi-factor, …
Top 10 security best practices for securing data in Amazon S3
Megan O'NeilSep 2
With more than 100 trillion objects in Amazon Simple Storage Service (Amazon S3) and an almost unimaginably broad set of use cases, securing data stored in Amazon S3 is important for every organization. So, we’ve curated the top 10 controls for securing your data in S3. By default, all S3 …
How to improve visibility into AWS WAF with anomaly detection
Cyril SolerSep 1
When your APIs are exposed on the internet, they naturally face unpredictable traffic. AWS WAF helps protect your application’s API against common web exploits, such as SQL injection and cross-site scripting. In this blog post, you’ll learn how to automatically detect anomalies in the AWS WAF metrics to improve your …
Ransomware mitigation: Top 5 protections and recovery preparation actions
Brad DispensaSep 1
In this post, I’ll cover the top five things that Amazon Web Services (AWS) customers can do to help protect and recover their resources from ransomware. This blog post focuses specifically on preemptive actions that you can take. #1 – Set up the ability to recover your apps and data …
route53resolver: 3 updated actions
Sep 4
3 updated actions: PutFirewallRuleGroupPolicy (access), PutResolverQueryLogConfigPolicy (access), PutResolverRulePolicy (access)
cloud9: 14 new actions | 3 updated actions
Sep 4
14 new actions: ActivateEC2Remote (start the amazon ec2 instance that your aws cloud9 ide connects to), CreateEnvironmentSSH (create an aws cloud9 ssh development environment), CreateEnvironmentToken (create an authentication token that allows a connection between the aws cloud9 ide and the user's environment), DescribeEC2Remote (get details about the connection to the …
ssm: 1 updated resource | 1 removed condition
Sep 4
1 updated resource: task (conditions)
sagemaker: 1 new action
Sep 4
1 new action: InvokeEndpointAsync (get inferences from the hosted model at the specified endpoint in an asynchronous manner)
iann0036
Ian Mckay @iann0036

The #AWS SDKs have just surpassed 10,000 API methods, as measured by the JS SDK data source. 2,175 of these were added in the past 12 months, which is pretty decent growth. Note the "re:Invent bump" as a major contributor.

0xdabbad00
Scott Piper @0xdabbad00

#awswishlist Provide a public identifier for internal issues to customers, so I can say I want to +1 that issue as opposed to describing it to an AWS rep to search for and track down in their internal systems.

clintgibler
Clint Gibler @clintgibler

📈 Top Open Source #Kubernetes Security Tools of 2021

Survey by @RedHat

cloud.redhat.com/blog/top-open-…

__steele
Aidan W Steele @__steele

I haven't had a chance to check yet: is this just a typo in the documentation, or are we going to have to type it like this in our code too?

Hopefully it's not like "Referer" all over again 😅

clintgibler
Clint Gibler @clintgibler

🍎 Summer of Fuzz: Targeting macOS

Deep dive @hackinthebox talk by Jeremy Brown

#Fuzzing:
* CLI/GUI Applications
* Network Clients and Servers

Tips:
* Debugging Tools
* SIP and App Sandbox
* Monitoring Process Execution
* Enumerating Handlers

conference.hitb.org/hitbsecconf202…

__steele
Aidan W Steele @__steele

On one hand, this is very cool.

On the other hand, I feel bad for the devs who will now have additional places to investigate when debugging connectivity issues between internal apps.

aws.amazon.com/blogs/aws/insp…

mchancloud
Michael Chan @mchancloud

1/📣📣📣 Spread the word! Over the coming months, you'll start to see more informative access denied error messages when using AWS. @AWSSecurityInfo

AWSIdentity
AWS Identity @AWSIdentity

Coming soon: Easily troubleshoot your permissions in AWS with additional context about the policy type responsible for denied access 👉 go.aws/3DuYZIf

0xdabbad00
Scott Piper @0xdabbad00

Attack research get clicks. Defense gets contracts.
Unless your business is focused on offense (and even then possibly), you should include defense guidance, otherwise someone else will get the attention of the potential customers that see your attack research.

bjohnso5y
Brigid Johnson @bjohnso5y

Happy this dude starting eating. His tummy wasn't feeling too great this morning.

zoph
Victor Grenu @zoph

This is the first time I see AWS warn customers about wrongly using attribute-based conditions keys. Pretty nice to put emphasis on this mistake 👀.

Open Source CSPMs?

Has anyone used an open-source CSPM? I've found a few: Cloud Custodian, CloudSploit, OpenCSPM, and MagPie. Wondering if any of these are viable options. What were the pros and cons of going with open source instead of a vendor product?

buymeacoffee