Opens profile photo
Follow
Marco Lancini
@lancinimarco
๐Ÿ’ผ Principal Security Engineer ๐Ÿ“š Writing CloudSecBooks.com ๐Ÿ’ฌ I tweet about Cloud Security and technical leadership โœ๐Ÿป Subscribe to CloudSecList.com
London, Englandmarcolancini.itJoined November 2010

Marco Lanciniโ€™s Tweets

Pinned Tweet
It's official: I'm writing a book! ๐Ÿ“– "The CloudSec Engineer" will be a book on how to enter, establish yourself, and thrive in the cloud security industry as an individual contributor. 1/
Embedded video
GIF
25
144
Show this thread
โ˜๏ธ How to set up ongoing replication from your third-party secrets manager to AWS Secrets Manager How to use third-party secrets manager as the source of truth for secrets, while replicating a subset of these secrets to AWS Secrets Manager.
2
โš—๏ธ gato An enumeration and attack tool that allows both blue teamers and offensive security practitioners to evaluate the blast radius of a compromised personal access token within a GitHub organization. From
5
This โฌ‡๏ธ
Quote Tweet
Companies like Microsoft would have an enormous amount of leverage and control as to how their user data is used by LLM providers like OpenAI to train better models. What leverage do small companies have? Surely they just end up trading their user data for โ€œAI-as-a-serviceโ€?
Show this thread
1
๐Ÿ”– Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms A recap on privilege escalation and powerful permissions in Kubernetes and an analisys of the ways various platforms have addressed it. From
4
I have an automation that searches for mentions of my websites daily, which accounts for... 5 API requests per day Not having a free tier seems a bit extreme
Quote Tweet
Starting February 9, we will no longer support free access to the Twitter API, both v2 and v1.1. A paid basic tier will be available instead ๐Ÿงต
Show this thread
1
๐Ÿ”– GitHub Container Registry private repos sometimesโ€ฆ werenโ€™t GHCR had an information leak bug, where names of private repos were exposed. Here's the background on how it was reported and fixed. From
19
โš—๏ธ AWS Cryptographic Computing for Clean Rooms (C3R) The C3R encryption client and SDK provide client-side tooling which allows users to participate in AWS Clean Rooms collaborations leveraging cryptographic computing by pre- and post-processing data.
1
โ˜๏ธ Apply policy bundles and monitor policy compliance at scale for Kubernetes clusters Policy Controller enables the enforcement of programmable policies for Anthos clusters. This blog is for introducing new features launched for ACM - Policy Controller.
1
โ˜๏ธ How to run AWS CloudHSM workloads in container environments How to use Docker to develop, deploy, and run applications by using the CloudHSM SDK, and how to manage and orchestrate workloads by using tools and services like ECS, EKS, and Jenkins.
1
๐Ÿ”– Crane: Uberโ€™s Next-Gen Infrastructure Stack Post examining the original motivation and some key features behind Uber's been multi-year journey to reimagine their infrastructure stack for a hybrid, multi-cloud world. From
5
๐Ÿ”– Consider All Microservices Vulnerable โ€” And Monitor Their Behavior Although all deployed microservices are vulnerable, there is much that can be done to ensure microservices are not exploited.
1
10