SRE Weekly Issue #338 • 📖 [The CloudSecList] Issue 154 • [tl;dr sec] #149 - Incident Response in AWS, CISA’s Supply Chain Security Guidance • Amazon Elastic Compute Cloud - 2 updated methods • Amazon EMR Containers - 3 updated methods • Amazon Lookout for Metrics - 3 updated methods • AWS Elemental MediaLive - 7 updated methods • Using AWS Shield Advanced protection groups to improve DDoS detection and mitigation • Implement step-up authentication with Amazon Cognito, Part 2: Deploy and test the solution • Implement step-up authentication with Amazon Cognito, Part 1: Solution overview

ASD Logo

12
Monday September, 2022

Sponsor

There's an IAM change in this Terraform pull request, what do I do?!

You know it, we know it – change is scary, but change is inevitable.

IAM Pulse is bringing much-needed clarity to Terraform change reviews by delivering actionable insights about what could happen downstream if an IAM change is applied.

Join our private beta and get a free AWS IAM Assessment!

In a nutshell

This week, Colm MacCárthaigh (VP / Distinguished Engineer at Amazon Web Services) shared with me his youtube channel.

Folks, it's a pure gold mine. You should definitely check out: Shuffle Sharding

ASD has a new landing-page, if you find this newsletter relevant, please share it with friends :)

Amazon Elastic Compute Cloud - 2 updated methods
Sep 8
This release adds support to send VPC Flow Logs to kinesis-data-firehose as new destination type
Amazon EMR Containers - 3 updated methods
Sep 8
EMR on EKS now allows running Spark SQL using the newly introduced Spark SQL Job Driver in the Start Job Run API
Amazon Lookout for Metrics - 3 updated methods
Sep 8
Release dimension value filtering feature to allow customers to define dimension filters for including only a subset of their dataset to be used by LookoutMetrics.
AWS Elemental MediaLive - 7 updated methods
Sep 8
This change exposes API settings which allow Dolby Atmos and Dolby Vision to be used when running a channel using Elemental Media Live
Using AWS Shield Advanced protection groups to improve DDoS detection and mitigation
Joe ViggianoSep 9
Amazon Web Services (AWS) customers can use AWS Shield Advanced to detect and mitigate distributed denial of service (DDoS) attacks that target their applications running on Amazon Elastic Compute Cloud (Amazon EC2), Elastic Local Balancing (ELB), Amazon CloudFront, AWS Global Accelerator, and Amazon Route 53. By using protection groups for …
Implement step-up authentication with Amazon Cognito, Part 2: Deploy and test the solution
Salman MoghalSep 7
This solution consists of two parts. In the previous blog post Implement step-up authentication with Amazon Cognito, Part 1: Solution overview, you learned about the architecture and design of a step-up authentication solution that uses AWS services such as Amazon API Gateway, Amazon Cognito, Amazon DynamoDB, and AWS Lambda to …
Implement step-up authentication with Amazon Cognito, Part 1: Solution overview
Salman MoghalSep 7
In this blog post, you’ll learn how to protect privileged business transactions that are exposed as APIs by using multi-factor authentication (MFA) or security challenges. These challenges have two components: what you know (such as passwords), and what you have (such as a one-time password token). By using these multi-factor …
connect: 1 updated action
Sep 10
1 updated action: UntagResource (conditions)
transfer: 6 new actions, 1 new resource | 3 updated actions
Sep 10
6 new actions: DeleteHostKey (Grants permission to delete a host key associated with a server), DescribeHostKey (Grants permission to describe a host key associated with a server), ImportHostKey (Grants permission to add a host key to a server), ListHostKeys (Grants permission to list host keys associated with a server), StartFileTransfer …
sns: 2 new actions
Sep 10
2 new actions: GetDataProtectionPolicy (Grants permission to return the data protection policy of the topic), PutDataProtectionPolicy (Grants permission to allow a topic owner to set the data protection policy)
bjohnso5y
Brigid Johnson @bjohnso5y

And just like that...with a lot of hard work and gusto I leveled up to L8. From intern to director and all in @AWS. Thank you to everyone on Team Brigid. 📈 🎉🍾

111Sep 08 · 1:07 AM
clintgibler
Clint Gibler @clintgibler

🧑‍🎓 Elixir Secure Coding Training

An interactive cybersecurity curriculum designed for enterprise use at software companies using @elixirlang

By @HoldenOullette

github.com/Podium/elixir-…

52Sep 06 · 1:00 AM
clintgibler
Clint Gibler @clintgibler

✍️ SAML: An Introduction to SAML and its security

Ruxmon 2022 talk by @snyff covering how SAML works and various attacks, including XXE, XML signature shenanigans, malicious identity providers, etc.

#infosec #cybersecurity

docs.google.com/presentation/d…

57Sep 07 · 7:00 PM
0xdabbad00
Scott Piper @0xdabbad00

New AWS terms and conditions:
- §70.5. AWS wants to avoid responsibility for any use of IQ (I'm surprised that wasn't already there).
- §87🚨 GuardDuty's Malware Protection may copy data outside of the regions you are using it (data governance folks FYI)

diffchecker.com/0C2FtHAU

27Sep 06 · 5:25 PM
elrowan
rowan @elrowan

Another crazy good/detailed post about AWS security by @jcfarris

This time it's about incident response chrisfarris.com/post/aws-ir/

The log tsunami vs your security budget picture is my favourite 😄

15Sep 06 · 2:04 AM
0xdabbad00
Scott Piper @0xdabbad00

Interesting abuse of some github UI and related issues with code exec in the CI pipeline. marcyoung.us/post/zuckerpun…

17Sep 11 · 10:07 PM
__steele
Aidan W Steele @__steele

Just booked my tickets to re:invent

0Sep 11 · 2:07 AM
__steele
Aidan W Steele @__steele

If you want to have a real bad time, you should try running a HTTP1/2/3 service on AWS ECS. I've just started day two of this saga and it's not going well. 😰

Has anyone got this working? Issues I've hit in no particular order:

7Sep 07 · 2:17 AM
kmcquade3
Kinnaird McQuade 💻☁️💥 @kmcquade3

I’m loving this early period in my startup where we are so focused on building a great product with great people.

I stepped back for a moment last night & realized that this period in my life will always be a special memory.

And we’re just getting started.

Back to the grind 💪🏼

0Sep 07 · 6:09 PM
jcfarris
Chris Farris @jcfarris

Yesterday I said farewell to Turner/WarnerMedia/Discovery. Today I’m on a flight to SouthEast Asia to meet my new team at their first post-pandemic all-hands. Exciting times!

0Sep 08 · 5:10 PM
aws-sso-util — what a fantastic project

I just wanted to give a shout out to the maintainers of https://github.com/benkehoe/aws-sso-util . It fills in so many little gaps with AWS SSO (which itself may be a bit clunky, but is a service I wish more people made use of). If you're using CloudFormation to manage SSO access …