It's official: I'm writing a book! ๐
"The CloudSec Engineer" will be a book on how to enter, establish yourself, and thrive in the cloud security industry as an individual contributor.
1/
๐ Threat Modelling Cloud Platform Services by Example: Google Cloud Storage
User/tenant configuration choices matter when evaluating the overall security posture of an instance of Google Cloud Storage. From
โ๏ธ How to set up ongoing replication from your third-party secrets manager to AWS Secrets Manager
How to use third-party secrets manager as the source of truth for secrets, while replicating a subset of these secrets to AWS Secrets Manager.
โ๏ธ gato
An enumeration and attack tool that allows both blue teamers and offensive security practitioners to evaluate the blast radius of a compromised personal access token within a GitHub organization. From
Companies like Microsoft would have an enormous amount of leverage and control as to how their user data is used by LLM providers like OpenAI to train better models.
What leverage do small companies have? Surely they just end up trading their user data for โAI-as-a-serviceโ?
๐ Enforcing Device AuthN & Compliance at Pinterest
How Pinterest enforced the use of managed and compliant devices in their Okta authentication flow, using a passwordless implementation. From
๐ Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms
A recap on privilege escalation and powerful permissions in Kubernetes and an analisys of the ways various platforms have addressed it. From
I have an automation that searches for mentions of my websites daily, which accounts for...
5 API requests per day
Not having a free tier seems a bit extreme
๐ Tampering User Attributes In AWS Cognito User Pools
Post explaining AWS Cognito User Attributes tampering and introducing a free lab to experiment with. From
๐ Enhancing Kubernetes security with user namespaces
Learn how to improve cluster security with user namespaces, a new feature introduced in Kubernetes v1.25. From
โ๏ธ Classic VM retirement: extending retirement date to September 1st 2023
Microsoft extended migration period for IaaS VMs from Azure Service Manager to Azure Resource Manager up to the 1st of September 2023.
๐ GitHub Container Registry private repos sometimesโฆ werenโt
GHCR had an information leak bug, where names of private repos were exposed. Here's the background on how it was reported and fixed. From
โ๏ธ AWS Cryptographic Computing for Clean Rooms (C3R)
The C3R encryption client and SDK provide client-side tooling which allows users to participate in AWS Clean Rooms collaborations leveraging cryptographic computing by pre- and post-processing data.
โ๏ธ Mitigate OWASP API security top 10 in Azure API Management
How to protect against common API-based vulnerabilities, as identified by the OWASP API Security Top 10 threats, using Azure API Management.
๐ Elevating Security Alert Management Using Automation
A post that describes the Brex Detection and Response Teamโs approach to managing and automating security alerts at scale. From
๐ A Guide to Running Sigstore Locally
How to stand up a Sigstore deployment on your own infrastructure on Kubernetes so that you will be able to take advantage of the benefits and the assurance of not exposing sensitive resources.
โ๏ธ Apply policy bundles and monitor policy compliance at scale for Kubernetes clusters
Policy Controller enables the enforcement of programmable policies for Anthos clusters. This blog is for introducing new features launched for ACM - Policy Controller.
โ๏ธ How to run AWS CloudHSM workloads in container environments
How to use Docker to develop, deploy, and run applications by using the CloudHSM SDK, and how to manage and orchestrate workloads by using tools and services like ECS, EKS, and Jenkins.
๐ Provisioning Kubernetes clusters on GCP with Terraform
Learn how you can leverage Terraform and GKE to provision identical clusters for development, staging and production environments with a single click.
๐ AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass
The Datadog Team identified a method to bypass CloudTrail logging for specific IAM API requests via undocumented APIs. From
โ๏ธ How to detect security issues in Amazon EKS clusters using Amazon GuardDuty
How to detect and investigate security issues in an EKS cluster with Amazon GuardDuty and Amazon Detective.
๐ Crane: Uberโs Next-Gen Infrastructure Stack
Post examining the original motivation and some key features behind Uber's been multi-year journey to reimagine their infrastructure stack for a hybrid, multi-cloud world. From
โ๏ธ Four phases of security transformation in financial services
Key principles that can serve as your guide when navigating a cloud security transformation journey.
My list of recommended cybersecurity news and information sources:
https://linkedin.com/pulse/my-recommendations-cybersecurity-news-information-jason-chan/โฆ
๐ Consider All Microservices Vulnerable โ And Monitor Their Behavior
Although all deployed microservices are vulnerable, there is much that can be done to ensure microservices are not exploited.
โ๏ธ Log Analytics in Cloud Logging is now GA
Cloud Loggingโs Log Analytics, with advanced search, as well as aggregation and transformation of all log data types, is now generally available.
๐ Leaking Secrets From GitHub Actions
Different areas that could help leaking secrets from GitHub Actions workflows: reading files and environment variables, intercepting network/process communication, and dumping memory. From