SRE Weekly Issue #312 • 📖 [The CloudSecList] Issue 127 • [tl;dr sec] #122 - Developer Experience is Security, Everything as Code Survey • Amazon Connect Service - 5 updated methods • Amazon DevOps Guru - 2 new 4 updated methods • Amazon Appflow - 3 updated methods • AWSKendraFrontendService - 1 updated methods • SOC reports now available in Spanish • Streamlining evidence collection with AWS Audit Manager • redshift: 2 new actions • elasticmapreduce: 4 new actions • connect: 1 new action • AWS Terms and Conditions added a hugely important and much needed addition, §1.19 "We will not use Individualized Usage Data or Your Content to compete with your products and services." (added Jan 28) <a href="https://t.co/Qe2iTD6uUk" target="_blank">aws.amazon.com/service-terms/</a> <a href="https://t.co/jBG8BaUpro" target="_blank">diffchecker.com/iXloQJqk</a> • ☁️ AWS Security Fundamentals Self-paced course by <a href="https://twitter.com/awscloud" target="_blank">@awscloud</a> covering fundamental security concepts, including: * Access control * Data encryption * And how network access to your AWS infrastructure can be secured <a href="https://t.co/j7kYLWxvKg" target="_blank">aws.amazon.com/training/digit…</a> • Names are hard. Especially when you have as many services as Amazon. <a href="https://twitter.com/QuinnyPig" target="_blank">@QuinnyPig</a> has been known to have opinions on this. So when you have a good name, why only use it once? Here’s a list of names that Amazon has recycled for completely different services: • Happy ending: in fewer than three weeks, the CodeBuild service team rolled out a change to address this issue. I updated the linked blog with details. I'm impressed. It was arguably a rather contrived "vulnerability", but they still did a good job of prioritising and fixing it. • 🛠️ New tool by <a href="https://twitter.com/bridgecrewio" target="_blank">@bridgecrewio</a>: Whorf A <a href="https://twitter.com/hashtag/Kubernetes" target="_blank">#Kubernetes</a> Validating Admission Controller that uses Checkov as the core validator for Kubernetes manifests Code: <a href="https://t.co/czrQKl8Upk" target="_blank">github.com/bridgecrewio/c…</a> Post by <a href="https://twitter.com/_SteveGiguere_" target="_blank">@_SteveGiguere_</a> <a href="https://t.co/vG88bYTknD" target="_blank">bridgecrew.io/blog/whorf-the…</a> • What is a technology that security people aren’t paying enough attention to that most security engineers will be forced to learn about in the next 5 years? For one reason or another. • We're partnering closely with Ukrainian IT organizations to disrupt attacks &amp; help support Ukrainian people during this difficult time: <a href="https://t.co/jX9LcLTaYi" target="_blank">aboutamazon.com/news/community…</a> • AWS: "You should sign your container images" Also AWS: "We don't support signing container images" ¯\_(ツ)_/¯ (feature request opened 3+ years ago) <a href="https://t.co/BOlpMDfzhf" target="_blank">aws.github.io/aws-eks-best-p…</a> <a href="https://t.co/tONxfnnpxd" target="_blank">github.com/aws/containers…</a> • I’m getting LASIK tomorrow and I’m so fucking excited • The "nodes/proxy" permission in K8s is equivalent to cluster admin. Allows to directly hit the Kubelet, authenticated as a worker node itself, and bypass admission control + audit logs. Now available in Stratus Red Team 1.6.0 to validate your detections! <a href="https://t.co/GXa13e3qBH" target="_blank">stratus-red-team.cloud/attack-techniq…</a> • RDS multi-az will now allow you to use the standby instance as a read replica (on newer versions) • What Exactly are VPC Endpoints and Why They Need Real Inter-Region Support • GitHub Project: Botocove Run a function against a selection of AWS accounts, Organizational Units (OUs), regions, or all AWS accounts in an organization, concurrently with thread safety. • I wrote a Glue tutorial for beginners, hope it helps someone :) • Why should I NOT store customers API keys in DynamoDB? • Breaking Google’s ReCaptcha v2 using.. Google.. Again • Escaping privileged containers for fun. • Newbie question: how to protect yourself about loosing the control of your cloud account • Should Amazon, Microsoft, Google and Other Cloud Companies Face More Government Oversight? - The Wall Street Journal • Nearly All Cybersecurity Companies Expose AWS Assets - Report - Infosecurity Magazine
7
Monday March, 2022

Comply with ISO 27001, GDPR, SOC 2 and more with Upsafe (Sponsor)

We don’t know you yet, but chances are that you prefer working on actual security rather than compliance paperwork or answers to security questionnaires 😬

Upsafe is opening its launch program to put compliance and questionnaires on autopilot. Just mention that you’re a reader of AWS Security Digest, a free trial will be available!


Amazon Connect Service - 5 updated methods
Mar 4
This release updates the *InstanceStorageConfig APIs so they support a new ResourceType: REAL_TIME_CONTACT_ANALYSIS_SEGMENTS. Use this resource type to enable streaming for real-time contact analysis and to associate the Kinesis stream where real-time contact analysis segments will be published.
Amazon DevOps Guru - 2 new 4 updated methods
Mar 4
Amazon DevOps Guru now integrates with Amazon CodeGuru Profiler. You can view CodeGuru Profiler recommendations for your AWS Lambda function in DevOps Guru. This feature is enabled by default for new customers as of 3/4/2022. Existing customers can enable this feature with UpdateEventSourcesConfig.
Amazon Appflow - 3 updated methods
Mar 3
Launching Amazon AppFlow Marketo as a destination connector SDK.
AWSKendraFrontendService - 1 updated methods
Mar 3
Amazon Kendra now suggests spell corrections for a query. For more information, see https://docs.aws.amazon.com/kendra/latest/dg/query-spell-check.html
SOC reports now available in Spanish
Rodrigo FiuzaMar 3
At Amazon Web Services (AWS), we continue to listen to our customers, regulators, and stakeholders to understand their needs regarding audit, assurance, certification, and attestation programs. We are pleased to announce that Fall 2021 AWS SOC 1, SOC 2 and SOC 3 reports are now available in Spanish. These translated …
Streamlining evidence collection with AWS Audit Manager
Nicholas ParksMar 3
In this post, we will show you how to deploy a solution into your Amazon Web Services (AWS) account that enables you to simply attach manual evidence to controls using AWS Audit Manager. Making evidence-collection as seamless as possible minimizes audit fatigue and helps you maintain a strong compliance posture. …

Fix AWS IAM permissions quickly with k9 Security (Sponsor)

Need to help your Cloud teams find and fix AWS IAM permissions issues quickly?

Control access to AWS APIs and data with k9’s simple policy automation and actionable IAM audits. Built for Cloud teams doing continuous delivery.


redshift: 2 new actions
Mar 5
2 new actions: DescribeReservedNodeExchangeStatus (describe exchange status details and associated metadata for a reserved-node exchange. statuses include such values as in progress and requested), GetReservedNodeExchangeConfigurationOptions (get the configuration options for the reserved-node exchange)
elasticmapreduce: 4 new actions
Mar 5
4 new actions: DeleteWorkspaceAccess (block an identity from opening a collaborative workspace), ListWorkspaceAccessIdentities (list identities that are granted access to a workspace), PutWorkspaceAccess (allow an identity to open a collaborative workspace), UpdateEditor (update an emr notebook)
connect: 1 new action
Mar 5
1 new action: UpdateContactFlowModuleContent (update contact flow module content in an amazon connect instance)
0xdabbad00
Scott Piper @0xdabbad00

AWS Terms and Conditions added a hugely important and much needed addition, §1.19 "We will not use Individualized Usage Data or Your Content to compete with your products and services." (added Jan 28)
aws.amazon.com/service-terms/
diffchecker.com/iXloQJqk

clintgibler
Clint Gibler @clintgibler

☁️ AWS Security Fundamentals

Self-paced course by @awscloud covering fundamental security concepts, including:

* Access control
* Data encryption
* And how network access to your AWS infrastructure can be secured

aws.amazon.com/training/digit…

__steele
Aidan W Steele @__steele

Names are hard. Especially when you have as many services as Amazon. @QuinnyPig has been known to have opinions on this.

So when you have a good name, why only use it once? Here’s a list of names that Amazon has recycled for completely different services:

__steele
Aidan W Steele @__steele

Happy ending: in fewer than three weeks, the CodeBuild service team rolled out a change to address this issue. I updated the linked blog with details.

I'm impressed. It was arguably a rather contrived "vulnerability", but they still did a good job of prioritising and fixing it.

__steele
Aidan W Steele @__steele

Very short blog post (five paragraphs): AWS VPC data exfiltration via CodeBuild.

awsteele.com/blog/2022/02/0…

clintgibler
Clint Gibler @clintgibler

🛠️ New tool by @bridgecrewio: Whorf

A #Kubernetes Validating Admission Controller that uses Checkov as the core validator for Kubernetes manifests

Code: github.com/bridgecrewio/c…

Post by @_SteveGiguere_

bridgecrew.io/blog/whorf-the…

kmcquade3
Kinnaird McQuade💥🌩 @kmcquade3

What is a technology that security people aren’t paying enough attention to that most security engineers will be forced to learn about in the next 5 years? For one reason or another.

StephenSchmidt
stephenschmidt @StephenSchmidt

We're partnering closely with Ukrainian IT organizations to disrupt attacks & help support Ukrainian people during this difficult time: aboutamazon.com/news/community…

christophetd
Christophe @christophetd

AWS: "You should sign your container images"
Also AWS: "We don't support signing container images"

¯\_(ツ)_/¯ (feature request opened 3+ years ago)

aws.github.io/aws-eks-best-p…

github.com/aws/containers…

kmcquade3
Kinnaird McQuade💥🌩 @kmcquade3

I’m getting LASIK tomorrow and I’m so fucking excited

christophetd
Christophe @christophetd

The "nodes/proxy" permission in K8s is equivalent to cluster admin. Allows to directly hit the Kubelet, authenticated as a worker node itself, and bypass admission control + audit logs.

Now available in Stratus Red Team 1.6.0 to validate your detections! stratus-red-team.cloud/attack-techniq…

raesene
Rory McCune @raesene

Todays blog is about the research I did with @smarticu5 on Kubernetes RBAC and node/proxy rights blog.aquasec.com/privilege-esca… with some ideas on how cluster operators can mitigate the risk if this is part of their threat model.

Newbie question: how to protect yourself about loosing the control of your cloud account

I'm a total newbie in security and I'm wondering how can you protect yourself about loosing the control of your main cloud account.

I mean, an attacker is able to get your account credentials and remove your access to your account. Is it that even possible under normal circumstances?

How …

buymeacoffee