SRE Weekly Issue #294 • 📖 [The CloudSecList] Issue 111 • [tl;dr sec] #107 - Supply Chain and CI/CD Security, Threat Modeling in HCL • AWS Security Hub adds support for cross-Region aggregation of findings to simplify how you evaluate and improve your AWS security posture • Amazon CloudWatch Application Insights - 11 updated methods • Amazon Connect Service - 2 new 3 updated methods • Amazon Elastic Compute Cloud - 2 updated methods • Amazon Rekognition - 1 updated methods • Forensic investigation environment strategies in the AWS Cloud • Migrate and secure your Windows PKI to AWS with AWS CloudHSM • Three ways to improve your cybersecurity awareness program • Correlate security findings with AWS Security Hub and Amazon EventBridge • textract: 2 new actions • logs: 1 updated action • cloudwatch: 1 new condition | 1 updated condition, 1 updated action • GitHub - rung/threat-matrix-cicd: Threat matrix for CI/CD Pipeline • Introducing Quiet Riot - Wes Ladd - Medium • 🛡️ Attacking and Securing CI/CD Pipelines <a href="https://twitter.com/rung" target="_blank">@rung</a>'s talk covers why CI/CD pipeline security is important, relevant breaches, several attack scenarios, and how to defend ATT&amp;CK-like matrix for CI/CD Pipelines. Repo 👇 <a href="https://t.co/8ATSle25iY" target="_blank">github.com/rung/threat-ma…</a> <a href="https://t.co/vyKItJfJBA" target="_blank">speakerdeck.com/rung/cd-pipeli…</a> • TTPs for compromising CI/CD pipelines, by <a href="https://twitter.com/rung" target="_blank">@rung</a> <a href="https://t.co/atxnCWn1Uy" target="_blank">github.com/rung/threat-ma…</a> • 🗡️ Awesome Linux <a href="https://twitter.com/hashtag/Rootkits" target="_blank">#Rootkits</a> Repo with links to source code of 10s of Linux rootkits Both user mode and kernel mode <a href="https://t.co/2UMttObNrP" target="_blank">github.com/milabs/awesome…</a> • AWS execs need to read this to see how users of other cloud providers don't have to deal with the limitations AWS has. • A new major release of AWS Secure Environment Accelerator (ASEA) is out (1.5), check out as there are some interesting new features, like the possibility to install it on top of AWS Control Tower. - <a href="https://t.co/JtCvID6wLN" target="_blank">github.com/aws-samples/aw…</a> • The entire training is under 700 words. <a href="https://t.co/fYlNAYGF25" target="_blank">learnsecurity.amazon.com/training/story…</a> • 🔥<a href="https://twitter.com/WesLadd" target="_blank">@WesLadd</a> dropped a new AWS security tool, Quiet Riot - unauthenticated enumeration and footprinting of AWS accounts that can validate AWS Account IDs and services in use (via existing service linked role names) at a rate of 1100 requests per second. <a href="https://t.co/KBV36jesqV" target="_blank">blog.traingrc.com/introducing-qu…</a> • Me: Asks a very, very specific question in an online forum related to cloud security **immediately receives 3 DMs from friends asking me what the hell I am up to** 😈 • Trick or treat? Pickles always chooses treat. Happy Halloween 🎃 • Reinvent presentations are like gas. To create them, they will take up as much time as you give them. • Amazon EC2 now supports sharing Amazon Machine Images across AWS Organizations and Organizational Units • Was billed 60k with a free tier? • AWS Toolbox 🧰 - A Collection of Awesome Tools and Scripts for Cloud Engineers • An improved Python AWS Lambda logging setup • Using Github Actions Open ID Connector to push to AWS ECR without Credentials - tedious ramblings • How I Cracked 70% of Tel Aviv’s Wifi Networks (from a Sample of 5,000 Gathered WiFi). • Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection • Announcing the New Balbix Connector for AWS - Security Boulevard • Balbix Extends Cyber Security Posture Automation to AWS - PRNewswire
1
Monday November, 2021
AWS Security Hub adds support for cross-Region aggregation of findings to simplify how you evaluate and improve your AWS security posture
Oct 20
AWS Security Huband, nbsp;now allows you to designate an aggregation Region and link some or all Regions to that aggregation Region. This gives you a centralized view of all your findings across all of your accounts and all of your linked Regions. After you link a Region to the aggregation …
Amazon CloudWatch Application Insights - 11 updated methods
Oct 29
Added Monitoring support for SQL Server Failover Cluster Instance. Additionally, added a new API to allow one-click monitoring of containers resources.
Amazon Connect Service - 2 new 3 updated methods
Oct 29
Amazon Connect Chat now supports real-time message streaming.
Amazon Elastic Compute Cloud - 2 updated methods
Oct 29
Support added for AMI sharing with organizations and organizational units in ModifyImageAttribute API
Amazon Rekognition - 1 updated methods
Oct 29
This release added new attributes to Rekognition Video GetCelebrityRecognition API operations.
Forensic investigation environment strategies in the AWS Cloud
Sol KavanaghOct 28
When a deviation from your secure baseline occurs, it’s crucial to respond and resolve the issue quickly and follow up with a forensic investigation and root cause analysis. Having a preconfigured infrastructure and a practiced plan for using it when there’s a deviation from your baseline will help you to …
Migrate and secure your Windows PKI to AWS with AWS CloudHSM
Govindarajan VaradanOct 27
AWS CloudHSM provides a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys in AWS. Using CloudHSM as part of a Microsoft Active Directory Certificate Services (AD CS) public key infrastructure (PKI) fortifies the security of your certificate authority (CA) private key …
Three ways to improve your cybersecurity awareness program
Stephen SchmidtOct 26
Raising the bar on cybersecurity starts with education. That’s why we announced in August that Amazon is making its internal Cybersecurity Awareness Training Program available to businesses and individuals for free starting this month. This is the same annual training we provide our employees to help them better understand and …
Correlate security findings with AWS Security Hub and Amazon EventBridge
Marshall JonesOct 25
In this blog post, we’ll walk you through deploying a solution to correlate specific AWS Security Hub findings from multiple AWS services that are related to a single AWS resource, which indicates an increased possibility that a security incident has happened. AWS Security Hub ingests findings from multiple AWS services, …
textract: 2 new actions
Oct 30
2 new actions: GetExpenseAnalysis (return information about an expense analysis job), StartExpenseAnalysis (start an asynchronous job to detect instances of invoices or receipts within an image or pdf provided as input)
logs: 1 updated action
Oct 28
1 updated action: PutSubscriptionFilter (resources)
cloudwatch: 1 new condition | 1 updated condition, 1 updated action
Oct 28
1 new condition: cloudwatch:requestInsightRuleLogGroups (filters actions based on the log groups specified in an insight rule.); 1 updated condition: cloudwatch:AlarmActions (type); 1 updated action: PutInsightRule (conditions)
clintgibler
Clint Gibler @clintgibler

🛡️ Attacking and Securing CI/CD Pipelines

@rung's talk covers why CI/CD pipeline security is important, relevant breaches, several attack scenarios, and how to defend

ATT&CK-like matrix for CI/CD Pipelines. Repo 👇
github.com/rung/threat-ma…

speakerdeck.com/rung/cd-pipeli…

christophetd
Christophe @christophetd

TTPs for compromising CI/CD pipelines, by @rung

github.com/rung/threat-ma…

clintgibler
Clint Gibler @clintgibler

🗡️ Awesome Linux #Rootkits

Repo with links to source code of 10s of Linux rootkits

Both user mode and kernel mode

github.com/milabs/awesome…

0xdabbad00
Scott Piper @0xdabbad00

AWS execs need to read this to see how users of other cloud providers don't have to deal with the limitations AWS has.

philvenables
Phil Venables @philvenables

Example of security and (micro-)economics needing to be aligned.

This is a great post from @forrestbrazeal esp. the crucial point on org/project structure decoupling from billing is crucial.

Billing "boundaries" are not usually security boundaries.

cloud.google.com/blog/products/…

zoph
Victor Grenu @zoph

A new major release of AWS Secure Environment Accelerator (ASEA) is out (1.5), check out as there are some interesting new features, like the possibility to install it on top of AWS Control Tower.

- github.com/aws-samples/aw…

0xdabbad00
Scott Piper @0xdabbad00

The entire training is under 700 words. learnsecurity.amazon.com/training/story…

amazonnews
Amazon News @amazonnews

Starting today, we're making the same cybersecurity training used by Amazon employees available to businesses and individuals around the world at no cost. #CybersecurityAwarenessMonth aboutamazon.com/news/community…

kmcquade3
Kinnaird McQuade💥🌩 @kmcquade3

🔥@WesLadd dropped a new AWS security tool, Quiet Riot - unauthenticated enumeration and footprinting of AWS accounts that can validate AWS Account IDs and services in use (via existing service linked role names) at a rate of 1100 requests per second.

blog.traingrc.com/introducing-qu…

kmcquade3
Kinnaird McQuade💥🌩 @kmcquade3

Me: Asks a very, very specific question in an online forum related to cloud security

**immediately receives 3 DMs from friends asking me what the hell I am up to**

😈

bjohnso5y
Brigid Johnson @bjohnso5y

Trick or treat? Pickles always chooses treat. Happy Halloween 🎃

bjohnso5y
Brigid Johnson @bjohnso5y

Reinvent presentations are like gas. To create them, they will take up as much time as you give them.

buymeacoffee