Amazon Macie announces a slew of new capabilities including support for cross-account sensitive data discovery, scanning by Amazon S3 object prefix, improved pre-scan cost estimation, and added location detail in findings • Amazon GuardDuty introduces machine learning domain reputation model to expand threat detection and improve accuracy • New IRAP report is now available on AWS Artifact for Australian customers • Over 40 services require TLS 1.2 minimum for AWS FIPS endpoints • Today I'm publishing "iamlive", a tool to generate basic <a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a> <a href="https://twitter.com/hashtag/IAM" target="_blank">#IAM</a> policies using client-side monitoring of calls made from the AWS CLI or SDKs.🔒☁️ Try it out today and let me know if it's helpful! <a href="https://t.co/jG77E3kExz" target="_blank">github.com/iann0036/iamli…</a> • Just dropped a new AWS security tool that auto-generates your AWS AllowList SCPs based on your needs. Let me explain - a thread 🧵 • I've uncovered a way to enumerate AWS IAM users/roles without being authenticated to the victim account 😈 If you update an IAM role's trust policy to allow sts:AssumeRole from an invalid IAM principal, you'll get an "Invalid principal" error No errors if the principal is legit • For the first time AWS has publicly recommended aws-nuke as a way of handling sandbox accounts. • PSA: The AWS Architecture Icon pack has been updated: <a href="https://t.co/49N1gbfLc0" target="_blank">aws.amazon.com/architecture/i…</a> • <a href="https://twitter.com/kmcquade3" target="_blank">@kmcquade3</a> This was first discovered by <a href="https://twitter.com/dagrz" target="_blank">@dagrz</a> and presented at Kiwicon in 2016 <a href="https://t.co/9QTF93oO8d" target="_blank">youtube.com/watch?v=vxgkHJ…</a> This is a must watch series of horribly recorded videos for people doing AWS security research that unfortunately hardly anyone has seen. Script at <a href="https://t.co/GiqIJsGeXA" target="_blank">github.com/dagrz/aws_pwn/…</a> • Very happy for <a href="https://twitter.com/ajassy" target="_blank">@ajassy</a>. A fantastic leader that I have learnt a lot from. I had the pleasure of meeting him in London a few years ago. Smart, humble, approachable. Excited to see what he does for the broader Amazon. • 💣 ExpressJS + Handlebars =&gt; RCE Excellent post by <a href="https://twitter.com/0xCaptainFreak" target="_blank">@0xCaptainFreak</a> on how providing a `layout` parameter can lead to Local File Read (steal source code / env variables) or RCE 👌 example of digging into framework internals <a href="https://twitter.com/hashtag/bugbounty" target="_blank">#bugbounty</a> <a href="https://twitter.com/hashtag/bugbountytips" target="_blank">#bugbountytips</a> <a href="https://t.co/9S4CDtkB9S" target="_blank">blog.shoebpatel.com/2021/01/23/The…</a> • 🏓 Cloud Security Table Top Exercises by <a href="https://twitter.com/matthewdfuller" target="_blank">@matthewdfuller</a> Relevant scenarios to think through, including: * Malicious VPC peering request * Compromised Lambda Layers * Injected CloudFormation Templates * Broken CloudTrail Logs * + a bunch more <a href="https://t.co/URQBbG3Puj" target="_blank">matthewdf10.medium.com/cloud-security…</a> • We're looking for a Sr Pentester - a technical leader who can tackle our toughest pentests, and inspire others to do the same. If that sounds like you, lets chat! <a href="https://t.co/XC1GhqkAMC" target="_blank">apply.workable.com/j/07544F7369</a> • 🙌 Got my re:Invent swag! • Run Prowler from AWS CloudShell in seconds: <a href="https://t.co/vTeBKajDNW" target="_blank">blyx.com/2021/02/02/run…</a> <a href="https://twitter.com/hashtag/AWS" target="_blank">#AWS</a> <a href="https://twitter.com/hashtag/hardening" target="_blank">#hardening</a> <a href="https://twitter.com/hashtag/security" target="_blank">#security</a> • My favourite use for this is granting account A (e.g. secops) permission to read objects via Athena owned by account B-Y (any other accounts in the org) in a bucket owned by account Z (a no-humans-allowed logging account) This wasn't possible before without lame workarounds. • Sophia is here to show you there are still reasons to smile. • Happy St. Brigid's!!! It may not be as famous as St. Patrick's, but a holiday to celebrate the returning of spring ☘️12 years ago I visited St. Brigid's cathedral in Kildare Ireland! ☘️ • Jeff Bezos to step down as CEO, replaced by AWS CEO Andy Jassy in Q3. • Slack’s Outage on January 4th 2021 • re:Invent videos are *finally* on YouTube • iamlive a tool to generate iam policies from aws cli or SDK calls • Node.js 14.x runtime now available in AWS Lambda | Amazon Web Services • 3 new SolarWinds vulnerabilities including RCE in Orion platform • Exploiting Nespresso smart cards for fun and coffee • Cloud security business acquisitions
8
Monday February, 2021

Amazon Macie announces a slew of new capabilities including support for cross-account sensitive data discovery, scanning by Amazon S3 object prefix, improved pre-scan cost estimation, and added location detail in findings

We are excited to announce a series of new capabilities that have been added to Amazon Macie to make it easier to configure, scope, and run sensitive data discovery in AWS, including support for scanning jobs that cover Amazon S3 buckets residing across multiple accounts, scoping of scans by object …

Amazon GuardDuty introduces machine learning domain reputation model to expand threat detection and improve accuracy

Amazon GuardDuty introduces a new machine learning domain reputation model that can categorize previously unseen domains as highly likely to be malicious or benign based on their behavioral characteristics. GuardDuty uses this new capability to alert customers when an EC2 instance in their AWS environment is communicating with a domain …

New IRAP report is now available on AWS Artifact for Australian customers

Henry XuFeb 4
We are excited to announce that a new Information Security Registered Assessors Program (IRAP) report is now available on AWS Artifact. The new IRAP documentation pack brings new services in scope, and includes a Cloud Security Control Matrix (CSCM) for specific information to help customers assess each applicable control that …

Over 40 services require TLS 1.2 minimum for AWS FIPS endpoints

Janelle HopperFeb 2
In a March 2020 blog post, we told you about work Amazon Web Services (AWS) was undertaking to update all of our AWS Federal Information Processing Standard (FIPS) endpoints to a minimum of Transport Layer Security (TLS) 1.2 across all AWS Regions. Today, we’re happy to announce that over 40 …
iann0036
Ian Mckay @iann0036

Today I'm publishing "iamlive", a tool to generate basic #AWS #IAM policies using client-side monitoring of calls made from the AWS CLI or SDKs.🔒☁️

Try it out today and let me know if it's helpful!

github.com/iann0036/iamli…

177Feb 06 · 7:11 AM
kmcquade3
Kinnaird McQuade💥☁️ @kmcquade3

Just dropped a new AWS security tool that auto-generates your AWS AllowList SCPs based on your needs.

Let me explain - a thread 🧵

SalesforceEng
@SalesforceEng @SalesforceEng

Check out aws-allowlister, another AWS Security tool we just open-sourced! It automatically generates AllowList SCPs to control which AWS services are allowed at the Account level, based on your compliance needs. Created by @kmcquade3 and @jasonadyke.
sforce.co/2Lpnn84

59Feb 04 · 5:33 PM
kmcquade3
Kinnaird McQuade💥☁️ @kmcquade3

I've uncovered a way to enumerate AWS IAM users/roles without being authenticated to the victim account 😈

If you update an IAM role's trust policy to allow sts:AssumeRole from an invalid IAM principal, you'll get an "Invalid principal" error

No errors if the principal is legit

30Feb 07 · 10:41 PM
0xdabbad00
Scott Piper @0xdabbad00

For the first time AWS has publicly recommended aws-nuke as a way of handling sandbox accounts.

AWSBlogUnreal
AWS Blog Unofficial. @AWSBlogUnreal

The AWS Management Tools Blog #AWSManagementTools
aws.amazon.com/blogs/mt/best-…
By: Nisha Nadkarni, jefstock* and Sonakshi Pandey

7Feb 02 · 6:42 AM
iann0036
Ian Mckay @iann0036

PSA: The AWS Architecture Icon pack has been updated: aws.amazon.com/architecture/i…

4Feb 04 · 11:24 PM
0xdabbad00
Scott Piper @0xdabbad00

@kmcquade3 This was first discovered by @dagrz and presented at Kiwicon in 2016 youtube.com/watch?v=vxgkHJ…

This is a must watch series of horribly recorded videos for people doing AWS security research that unfortunately hardly anyone has seen.

Script at github.com/dagrz/aws_pwn/…

4Feb 08 · 12:14 AM
steven_bryen
Steven Bryen @steven_bryen

Very happy for @ajassy. A fantastic leader that I have learnt a lot from. I had the pleasure of meeting him in London a few years ago. Smart, humble, approachable. Excited to see what he does for the broader Amazon.

0Feb 02 · 10:40 PM
clintgibler
Clint Gibler @clintgibler

💣 ExpressJS + Handlebars => RCE

Excellent post by @0xCaptainFreak on how providing a `layout` parameter can lead to Local File Read (steal source code / env variables) or RCE

👌 example of digging into framework internals

#bugbounty #bugbountytips

blog.shoebpatel.com/2021/01/23/The…

14Feb 02 · 5:00 PM
clintgibler
Clint Gibler @clintgibler

🏓 Cloud Security Table Top Exercises by @matthewdfuller

Relevant scenarios to think through, including:
* Malicious VPC peering request
* Compromised Lambda Layers
* Injected CloudFormation Templates
* Broken CloudTrail Logs
* + a bunch more

matthewdf10.medium.com/cloud-security…

6Feb 03 · 9:00 PM
RhinoSecurity
Rhino Security Labs @RhinoSecurity

We're looking for a Sr Pentester - a technical leader who can tackle our toughest pentests, and inspire others to do the same. If that sounds like you, lets chat!
apply.workable.com/j/07544F7369

7Feb 06 · 12:21 AM
__steele
Aidan W Steele @__steele

My favourite use for this is granting account A (e.g. secops) permission to read objects via Athena owned by account B-Y (any other accounts in the org) in a bucket owned by account Z (a no-humans-allowed logging account)

This wasn't possible before without lame workarounds.

__steele
Aidan W Steele @__steele

@ShortJared Add this to your bucket and the x-account objects will be owned by the bucket owner. Life-changer!

3Feb 06 · 2:18 AM
AlexandreSieira
Alexandre Sieira @AlexandreSieira

Sophia is here to show you there are still reasons to smile.

0Feb 03 · 3:38 PM
bjohnso5y
Brigid Johnson @bjohnso5y

Happy St. Brigid's!!! It may not be as famous as St. Patrick's, but a holiday to celebrate the returning of spring ☘️12 years ago I visited St. Brigid's cathedral in Kildare Ireland! ☘️

0Feb 01 · 8:50 PM

Cloud security business acquisitions

Cyber security is a very financially hot industry based off the numbers. I am looking to make acquisitions in the upcoming future.

I had some questions as I am experienced in acquisitions but new to cloud security:

-How fragmented is this industry?

-At what earnings multiple do small companies sell …