Sponsor
Who loves managing access to AWS infrastructure across multiple accounts? No one. Its time-consuming complexity creates an unproductive experience for engineers and developers alike.
Teleport makes managing identity-based access to AWS infrastructure dead simple by using a single identity across all your accounts. This allows organizations to tear down access silos while making engineers happy, all while maintaining security and compliance.
In a nutshell
Uber was breached by an 18 years old hacker who gained access using Social Engineering, and MFA Push spamming, then got an admin credential found in a PS1 script.
The same kid seems to have breached Rockstar Games and leaked GTA VI footage.
📢 MAMIP (Monitor AWS Managed IAM Policies)
Policies changed since last week:
- AWSConfigServiceRolePolicy
- AWSIoTSiteWiseReadOnlyAccess
- AWS_ConfigRole
- AmazonCloudWatchEvidentlyServiceRolePolicy
- AmazonElasticsearchServiceRolePolicy
- AmazonOpenSearchServiceRolePolicy
- AmazonSSMServiceRolePolicy










✨Linux tips 🧵
1. Always remove the french language pack:
sudo rm -fr ./*



After using AWS for ~14 years, I've internalised a handful of design patterns that I try to apply to my own software. I'm keen to know if it's the same for other folks.
Roughly: tags, IDs (thrice), limits, pagination.
(I'm not going to use the thread emoji)



Turns out they gave you a session ID instead of an order ID. Doh!
This is where resource ID *prefixes* are insanely useful. Think EC2 instance IDs: i-abc123 or EBS volumes: vol-def456.
Now when you ask a user for an ID, you'll know immediately if it's the wrong thing entirely.



☁️ AWS Security Assessment Solution
An AWS tool to help you create a point in time assessment of your AWS account using Prowler and Scout as well as optional AWS developed ransomware checks
github.com/awslabs/aws-se…



✅ Kubernetes Security Checklist
#Kubernetes documentation page that covers:
* Authentication and Authorization
* Network security
* Pod security
* Pod placement
* Secrets
* Images
* Admission controllers
kubernetes.io/docs/concepts/…



I've been an advisor to Noq, and I'm thrilled to see @ccastrapel and @krisharms have taken it out of stealth!



Pour yourself a bowl of doritos and mountain dew, grab a spoon, and chow down on this AWS wisdom!

After using AWS for ~14 years, I've internalised a handful of design patterns that I try to apply to my own software. I'm keen to know if it's the same for other folks.
Roughly: tags, IDs (thrice), limits, pagination.
(I'm not going to use the thread emoji)



This is a new amazing piece of AWS security tooling! Great work @sethsec @cvendramini2
github.com/BishopFox/clou…

Meet CloudFox, a tool that helps you gain situational awareness in unfamiliar #cloud environments. This tool was created for #pentesters + #offsec professionals to find exploitable #attackpaths in cloud infrastructure. @sethsec & @cvendramini2 explain: bfx.social/3qA8Rve



🔖 matano
An open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting.
github.com/matanolabs/mat…


Probably not the first person, but I recently discovered an interesting consequence of the way ECS task definitions are implemented that allows indefinitely storing an unlimited amount of arbitrary data for free with no data transfer cost:
- You can store arbitrary data in an ECS task definition within the environment …
UPDATE: Resolved, see final update at end.
To start with, I already have two open cases with support for this :)
I have been planning to upgrade our Control Tower Landing Zone from 2.9 to 3.0 for a while. Opened a case with support to see if there's anything we …
- 🖊️ This digest was forwarded to you? Subscribe here
- 📢 Promote your content with sponsorship
- 💌 Want to suggest new content: contact me or reply to this email