Sponsor - Secure your Cloud Infrastructure with Teleport and AWS IAM
Join Teleport for the webinar on October 13th and learn about the challenges in securely delegating access to your AWS resources. Save your spot to find out:
- How companies are currently managing their AWS infrastructure
- Integrating Teleport Access Plane with AWS IAM
- The top 5 advantages of using Teleport to access AWS resources
In a nutshell
Lately, I've released ten bare-minimum AWS Security alerts to bootstrap your AWS Accounts security with the most common suspicious activities detection.
It's available as free open-source software.
📢 MAMIP (Monitor AWS Managed IAM Policies)
Policies changed since last week:
- AWSMigrationHubStrategyCollector
- AWSServiceRoleForMonitronPolicy
- AWSSupportPlansFullAccess
- AWSSupportPlansReadOnlyAccess
- AmazonFSxFullAccess
- AppIntegrationsServiceLinkedRolePolicy

🛠️ Nginxpwner
A simple tool to look for common Nginx misconfigurations and vulnerabilities,
By @stark0de1
#bugbounty #bugbountytips
github.com/stark0de/nginx…



Detecting exfiltration of EBS snapshots in AWS⬇️
When an attacker copies an EBS snapshot from your account to theirs, or creates an EBS volume from it, CloudTrail generates a SharedSnapshotCopyInitiated or SharedSnapshotVolumeCreated event.




Seattle voters, in 40 days time we'll have chosen our future voting system for City elections. Use your ballot and pick Ranked Choice Voting! It's the best option, we'll get positive coalition building and it will move us closer to even better elections. Thread time ...



🔎 PDF Examiner
Provides an overview of the inner file structure of a PDF and extracts /URI and /JS data
github.com/5f0ne/pdf-exam…



AWS: Go and enable IMDSv2 on your instances
Also AWS: ... but we won't make it a default, even for new accounts
Also AWS: ... it will also take 3 years until we support it in our own services

Lightsail just got IMDSv2 support. I didn't realize it didn't have that already. lightsail.aws.amazon.com/ls/docs/en_us/… twitter.com/publiccloudbot…



AWS Support now brings the greatness of IAM actions, helping you control access to manage your support plan. Best part?! You no longer need root for this. Say goodbye to another root use case. go.aws/3y9v2MO




A good example of how AWS continues to raise the security bar for our customers📈 You probably do not depend on self assume role functionality, but now you need to make it explicit in the role trust policy. This makes controlling access to who can assume a role more clear.👀 A 🧵 twitter.com/AWSSecurityInf…

Announcing an update to IAM role trust policy behavior: go.aws/3DFBS08



Update: I realized one of my favorite tools already does GitHub Copilot for your terminal
Maybe it will make me not suck at Regex


Open source idea: GitHub Copilot for your terminal



Another bullet can be removed from the list of tasks that require the root user. docs.aws.amazon.com/accounts/lates…

AWS announces updated Support Plans Console with new IAM controls
AWS Support continues to provide a mix of tools, technology, people, and programs to help you optimize performance, lower costs, and innovate faster. Today, the new AWS Support Plans... aws.amazon.com/about-aws/what…



AWS Credentials in Boto3 and CLI Debug Output — and the AWS Console: ACM.68 Do you know where all your credentials and secrets are being output in logs, debug information, or in the AWS console?
~~~~~~~~~~~~~~~~~~~~~~~~
by Teri Radichel | Oct 2, 2022 medium.com/cloud-security…


- 🖊️ This digest was forwarded to you? Subscribe here
- 📢 Promote your content with sponsorship
- 💌 Want to suggest new content: contact me or reply to this email