cloud_sec | Unsorted

Telegram-канал cloud_sec - CloudSec Wine

2199

All about cloud security Contacts: @AMark0f @dvyakimov About DevSecOps: @sec_devops

Subscribe to a channel

CloudSec Wine

🔴 DevSecOps and CI/CD using Google Cloud Built-in Services

How to build a secure CI/CD pipeline using Google Cloud's built-in services using Cloud Build, Cloud Deploy, Artifact Registry, Binary Authorization and GKE.

https://cloud.google.com/blog/products/devops-sre/devsecops-and-cicd-using-google-cloud-built-in-services

#gcp

Читать полностью…

CloudSec Wine

🔴 Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature

A security risk discovered in the Google Cloud Platform domain-wide delegation feature allows a user to generate an access token to Google Workspace, granting unauthorized access to data and other key tools.

https://unit42.paloaltonetworks.com/critical-risk-in-google-workspace-delegation-feature/

#gcp

Читать полностью…

CloudSec Wine

🔶 How fast is CloudTrail today? Investigating CloudTrail delays using Athena

Investigating how long CloudTrail takes to deliver events in 2023.

https://tracebit.com/blog/2023/11/how-fast-is-cloudtrail-today-investigating-cloudtrail-delays-using-athena/

#aws

Читать полностью…

CloudSec Wine

🔴 Pwning Cloud Contexts, The Endgame

Slides from a Black Hat MEA 2023 talk discussing how a GitHub token led to the compromise of an entire GCP organization.

https://docs.google.com/presentation/d/1sVZohEgGKDkgwgVNzquNzSzKdLDMOFgAiiR78kcgBAw/edit#slide=id.g29a3b4d3924_0_137

#gcp

Читать полностью…

CloudSec Wine

🔷 All the Small Things: Azure CLI Leakage and Problematic Usage Patterns

Post discussing the unintentional leakage of Azure Application Variables in GitHub build logs due to Azure CLI's default behavior.

https://www.paloaltonetworks.com/blog/prisma-cloud/secrets-leakage-user-error-azure-cli/

#azure

Читать полностью…

CloudSec Wine

🔴 Enhancing Cybersecurity with Security Command Center's Attack Path Simulations and Attack Exposure Scoring

Security Command Center (SCC) recently introduced two new features: Attack Path Simulation (APS) and Attack Exposure Scoring (AES).

https://medium.com/google-cloud/enhancing-cybersecurity-with-security-command-centers-attack-path-simulation-and-attack-path-46c527cd4927

(Use VPN to open from Russia)

#gcp

Читать полностью…

CloudSec Wine

🔶 Reversing AWS IAM unique IDs

How to identify the ARN of a user/role from AWS IAM unique IDs, often seen in CloudTrail logs.

https://awsteele.com/blog/2023/11/19/reversing-aws-iam-unique-ids.html

#aws

Читать полностью…

CloudSec Wine

🔶 Building sensitive data remediation workflows in multi-account AWS environments

A solution that provides you with visibility into sensitive data residing across a fleet of AWS accounts through a ChatOps-style notification mechanism using Microsoft Teams, which also provides contextual information needed to conduct security investigations.

https://aws.amazon.com/ru/blogs/security/building-sensitive-data-remediation-workflows-in-multi-account-aws-environments/

#aws

Читать полностью…

CloudSec Wine

🔶 Lambda Extensions: Exploring Misuse Scenarios and Stratus Red Team Module Development

Post analyzing a well-known attack vector and then showing how to build a module for Stratus Red Team, a self-contained binary we can use to detonate offensive attack techniques against a live cloud environment easily.

https://awstip.com/lambda-extensions-exploring-misuse-scenarios-and-stratus-red-team-module-development-b63c5a73491a

(Use VPN to open from Russia)

#aws

Читать полностью…

CloudSec Wine

🔷 Mistaken Identity: Extracting Managed Identity Credentials from Azure Function Apps

The article discusses a security vulnerability in Azure Function Apps, where Linux containers use an encrypted startup context file that can be decrypted to expose sensitive data, including Managed Identity certificates.

https://www.netspi.com/blog/technical/cloud-penetration-testing/mistaken-identity-azure-function-apps

#azure

Читать полностью…

CloudSec Wine

🔶 How to create an AMI hardening pipeline and automate updates to your ECS instance fleet

How to create a workflow to enhance Amazon ECS-optimized AMIs by using the CIS Docker Benchmark and automatically updating your EC2 instances in your ECS cluster with the newly created AMIs.

https://aws.amazon.com/ru/blogs/security/how-to-create-an-ami-hardening-pipeline-and-automate-updates-to-your-ecs-instance-fleet/

#aws

Читать полностью…

CloudSec Wine

🔷 Spoofing Microsoft Entra ID Verified Publisher Status

It was possible to manipulate the consenting process of a legitimate verified publisher application to implant malicious unverified applications within a Microsoft Entra ID tenant.

https://www.secureworks.com/research/spoofing-microsoft-entra-id-verified-publisher-status

#azure

Читать полностью…

CloudSec Wine

🔶 Announcing the EKS Cluster Games

Wiz released "The EKS Cluster Games", a cloud security Capture The Flag (CTF) event. The mission? To identify and learn about common Amazon EKS security issues.

https://www.wiz.io/blog/announcing-the-eks-cluster-games

#aws

Читать полностью…

CloudSec Wine

🔴 Migrating to Google Workspace: Solving Email Routing Challenges

My firsthand experience with migrating from Cloudflare Email Routing to Google Workspace.

https://blog.marcolancini.it/2023/blog-migrate-to-google-workspace/

#gcp

Читать полностью…

CloudSec Wine

🔶 CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys

PaloAlto analyzes an attack path starting with GitHub IAM exposure and leading to creation of AWS Elastic Compute instances, which TAs used to perform cryptojacking.

https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/

#aws

Читать полностью…

CloudSec Wine

🔷 Microsoft Incident Response lessons on preventing cloud identity compromise

Different scenarios involving misconfigured hybrid identity setups that could lead to compromise of Microsoft Entra ID.

https://www.microsoft.com/en-us/security/blog/2023/12/05/microsoft-incident-response-lessons-on-preventing-cloud-identity-compromise/

#azure

Читать полностью…

CloudSec Wine

🔶 Avoid accidental exposure of authenticated Amazon API Gateway resources

The article advises securing Amazon API Gateway by setting default authorizers and applying resource policies for IAM authentication, to prevent accidental exposure and enhance security through defense in depth.

https://www.wolfe.id.au/2023/11/12/avoid-accidental-exposure-of-authenticated-amazon-api-gateway-resources/

#aws

Читать полностью…

CloudSec Wine

🔶 Deep dive into the new Amazon EKS Pod Identity feature

Earlier this week, AWS released a new feature, EKS Pod Identity, that aims to simplify granting AWS access to pods running in an EKS cluster. This post deep-dives into how this feature works, some elements that make it unique, and why you might consider using it.

https://securitylabs.datadoghq.com/articles/eks-pod-identity-deep-dive/

#aws

Читать полностью…

CloudSec Wine

🔶 Preventing Accidental Internet-Exposure of AWS Resources

Many AWS customers have suffered breaches due to exposing resources to the Internet by accident. This three-part series walks through different ways to mitigate that risk.

https://kevinhock.github.io/2023/11/26/preventing-accidental-internet-exposure-of-aws-resources-part-1-vpc.html

#aws

Читать полностью…

CloudSec Wine

🔶 How to use multiple instances of AWS IAM Identity Center

You can now have two types of IAM Identity Center instances: organization instances and account instances.

https://aws.amazon.com/ru/blogs/security/how-to-use-multiple-instances-of-aws-iam-identity-center/

#aws

Читать полностью…

CloudSec Wine

🔶 Establishing a data perimeter on AWS: Require services to be created only within expected networks

How to use preventative controls to help ensure that your resources are deployed within your VPC, so that you can effectively enforce the network perimeter controls.

https://aws.amazon.com/ru/blogs/security/establishing-a-data-perimeter-on-aws-require-services-to-be-created-only-within-expected-networks/

#aws

Читать полностью…

CloudSec Wine

🔷 (Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching

Presentation examining how JSON Web Token (JWT) caching works in corporate settings with Azure Active Directory (Azure AD) integration, including Azure AD Joined and Hybrid environments.

https://github.com/FuzzySecurity/SANS-HackFest-2023/blob/main/SANS_HackFest23-Abusing_The-Microsoft-Identity-Platform.pdf

#azure

Читать полностью…

CloudSec Wine

🔷 Public preview: Confidential containers on Azure Kubernetes Service (AKS)

AKS now lets you run individual pods in their own trusted execution environment (TEE).

https://techcommunity.microsoft.com/t5/apps-on-azure-blog/public-preview-confidential-containers-on-aks/ba-p/3980871

#azure

Читать полностью…

CloudSec Wine

🔶🔷🔴 State of Cloud Security

Datadog analyzed data from thousands of organizations to understand the latest trends in cloud security posture.

https://www.datadoghq.com/state-of-cloud-security/

#aws #azure #gcp

Читать полностью…

CloudSec Wine

🔴 Introducing Advanced Vulnerability Insights for GKE

Artifact Analysis in partnership with Google Kubernetes Engine has introduced a new vulnerability scanning offering called Advanced Vulnerability Insights.

https://cloud.google.com/blog/products/identity-security/introducing-advanced-vulnerability-insights-for-gke

#gcp

Читать полностью…

CloudSec Wine

🔷 The Triforce of Initial Access

The article emphasizes that the success of Red Teaming often hinges on the quality of information (loot) gathered and the effectiveness of the tools used, such as Evilginx, ROADtools, and TeamFiltration, complemented by the Bobber script.

https://trustedsec.com/blog/the-triforce-of-initial-access

#azure

Читать полностью…

CloudSec Wine

🔷 Weather Forecast: Money Is Going to Rain from the Cloud

SafeBreach researchers discovered and exploited a billing flaw in Azure Automation Service, enabling free, hidden, and unstoppable cryptocurrency mining using Python scripts and Runbooks.

https://www.safebreach.com/blog/cryptocurrency-miner-microsoft-azure

#azure

Читать полностью…

CloudSec Wine

🔶🔴 ApatchMe - Authenticated Stored XSS Vulnerability in AWS and GCP Apache Airflow Services

Unpatched Apache Airflow instances used in AWS and GCP allow an exploitable stored XSS through the task instance details page.

https://www.tenable.com/blog/apatchme-authenticated-stored-xss-vulnerability-in-aws-and-gcp-apache-airflow-services

(Use VPN to open from Russia)

#aws #gcp

Читать полностью…

CloudSec Wine

🔶 The deputy is confused about AWS Security Hub

The article highlights a potential issue with AWS Security Hub where incorrect AWS account IDs could lead to cross-tenant data pollution, potentially allowing an attacker to pollute someone else's Security Hub.

https://blog.plerion.com/the-deputy-is-confused-about-aws-security-hub/

#aws

Читать полностью…

CloudSec Wine

🔶 AWS Network Firewall egress filtering can be easily bypassed

If you are thinking of or are already using AWS Network Firewall to control and filter egress traffic to only allow connections to approved destination sites, you need to read this post, as it may not work as you have thought.

https://canglad.com/blog/2023/aws-network-firewall-egress-filtering-can-be-easily-bypassed/

#aws

Читать полностью…
Subscribe to a channel