• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

AWS Wish List. Make a wish. It might be granted… | by Teri Radichel | Cloud Security | Sep, 2022

flyytech by flyytech
September 11, 2022
Home Security
Share on FacebookShare on Twitter


Make a wish. It might be granted! #awswishlist

This is a hiatus for a minute on my series on Automating Cybersecurity Metrics to tell you about the AWS Wish List.

AWS Feature Requests

Back when I worked at Capital One on the cloud engineering team one of the things I was asked to do was to manage the list of AWS features that Capital One wanted AWS to implement. Of course Capital One had a lot of leverage with AWS at the time because they were the first major bank in the United States to move to AWS. And yes they had a breach, but cloud security is complicated and that is what my latest blog series is trying to address.

At any rate, Capital One did help make some major improvements to AWS security. One of the issues with AWS S3 is that it required applications to traverse the Internet in order to put or get objects. This was something Capital One was not keen on doing since prior to cloud any connection to a vendor required a private line (MPLS for those who are familiar) to do business with the bank. Sending data over the Internet was just not cool.

Capital one requested a feature that would allow companies to keep the information off the Internet as it traversed the network from an AWS VPC to an S3 bucket and vice versa. That feature became S3 endpoints. From there S3 endpoints have evolved to Network Endpoints. Now you can send data from application sources to storage sources either within your VPC or at least keep it on the AWS backbone as it traverses the network. It will depend on which services you are using and if they keep all data between regions on the AWS backbone or not.

Capital One obviously had a bit more leverage than you or I do to get new features implemented at AWS, but AWS does listen to customers. If enough people ask, they will implement new features and fix problems. There are different ways to submit requests to AWS but one of the most visible is the AWS Wish List.

#awswishlist

One day as I was frustrated about something I couldn’t do or was not working correctly I randomly tweeted it out on Twitter with the tag #awswishlist. I didn’t realize that anyone else had ever done that before. Out of curiosity I searched for that tag and found that some other people had done something similar.

As it turns out, AWS created a whole website just for the #awswishlist. You can see who is contributing and some of the wishes that have been fulfilled.

You can also head over to Twitter to see what’s on the wishlist and like or retweet your favs. AWS will likely take notice if a particular tweet gets a lot of likes and retweets.

Some of the other ways you can ask for features or fixes on AWS, though I have had little success with some of these not being a huge corporation:

  • AWS support in the AWS console
  • The feedback link on the AWS site — I’ve been submitting requested changes for SSO, Control Tower, and Organizations and I don’t see that any of them had any effect, unfortunately.
  • Some of the AWS services have Github accounts where they publish their road map and people can submit feedback directly on a road map for a specific service.

If you have a TAM (account manager) with AWS and especially if you are a large company paying a lot of money, you will likely have more success with direct feature requests with your account manager. I used to track all our feature requests across the organization with the help of our TAM in a spreadsheet, who submitted it, and when AWS was planning a release of that feature (or if they couldn’t do it.)

There are some things that AWS said were “absolutely not possible” back then that are possible today. For example, we got an increase in the number of security group rules but there was no way to increase the number of rules for a subnet network access control list (NACL). I recently noticed that now you can request an increase (though still limited) to NACL ingress and egress rules but they warn you that might come with a performance degradation. So never say never when it comes to a request. It may take some time for AWS to re-architecture things but if enough people ask — wishes come true!

Bugs and Error Messages

Lately I’ve been working on a new batch of code on AWS and sometimes it’s the littlest thing that takes so much time to resolve. If only the error message was clear I could have fixed the problem in no time and and get back to writing the code that actually accomplishes my objective. Instead I’m digging around on Google and in AWS documentation seeking answers to obscure problems with unclear error messages. I recently started writing a blog post every time I hit one of these obscurities both to help myself in the future and anyone else having the same problem. I’m documenting them on this new blog — Bugs that Bite:

I don’t send all these out in emails because they might not apply to everyone and who wants a bug list? The bugs and error messages are not all related to AWS, that just happens to be the platform I’m working on at the moment. If I switched to Azure or Google I would run into and equal or greater number of problems because I have — while preparing for classes or performing security assessments or penetration tests on those platforms.

My global wish for AWS is that they (and everyone else in the world writing software because I find bugs EVERYWHERE) would take the time to test code thoroughly and write proper error messages. In addition, error handlers can be very helpful in providing a proper response to errors. I don’t want to put every one of these on the wishlist because some of them are too complicated to explain in a tweet, plus there are so many and I don’t want to overload the list with little bugs as opposed to major features or changes.

I put in a general request for AWS to look through this list and address some of these issues. If you’ve ever experienced one of these error messages or problems and feel like a better error message would help please clap for the story to get it to rise to the top of the list.

A wish for penetration testing on AWS that came true

My favorite AWS wishlist item was the request to perform a penetration test without submitting a request form. I think I may have submitted that request multiple times. This was after I was working at Capital One. I debated this item with someone in Seattle at AWS who oversaw or worked with that group located in South Africa at the time, and he tried to tell me it was simply not possible, even though Microsoft and Google allowed it.

Then one day, I was in the middle of my first beta class through 2nd Sight Lab and I realized I forgot to request access for students to perform the pentest lab. Shoot! My students were not going to be able to do the lab! Oh no…I quickly sent an email to AWS begging them to quickly process the request. It was on that day that they told me in an email that I no longer needed to make that request. Hallelujah.

I put a copy of the email on Twitter with a statement: Behold…the rules for Pentesting on AWS have changed… or something to that effect. I went to class and when I got out the Tweet had about 1500 likes and was getting retweeted all over the place, but someone was questioning it because the AWS web site hadn’t been updated. I freaked out a bit because I thought what if I had somehow been sent a bogus email and was telling the world to hack AWS?! But it was true. The website got updated a few days later.

I remember going to an advanced penetration testing class at SANS Institute and someone asked the instructor (who shall remain unnamed because now he is a colleague and friend) how to do penetration tests on AWS. He provided an incorrect answer so I raised my hand and explained that you no longer need to put in that request. I was publicly rebuked and humiliated in front of the class telling me I was wrong. No hard feelings but…I was not wrong.

It is so much easier to perform penetration tests for customers now as a result of that change. There are still limitations on what you can do in a penetration test on AWS so make sure you follow the rules! Someone contacted me and said, “so I can test anyone’s account?” No, only your own.

Now…about that Bug Bounty request…. 🙂

Teri Radichel

If you liked this story please clap and follow:

Medium: Teri Radichel or Email List: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests services via LinkedIn: Teri Radichel or IANS Research

© 2nd Sight Lab 2022

All the posts in this series:

____________________________________________

Author:

Cybersecurity for Executives in the Age of Cloud on Amazon

Need Cloud Security Training? 2nd Sight Lab Cloud Security Training

Is your cloud secure? Hire 2nd Sight Lab for a penetration test or security assessment.

Have a Cybersecurity or Cloud Security Question? Ask Teri Radichel by scheduling a call with IANS Research.

Cybersecurity & Cloud Security Resources by Teri Radichel: Cybersecurity and Cloud security classes, articles, white papers, presentations, and podcasts





Source_link

flyytech

flyytech

Next Post
Quick as a flash: How the vivo Y35 keeps up with your modern lifestyle

Quick as a flash: How the vivo Y35 keeps up with your modern lifestyle

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Samsung Begins to Produce Third 3nm Chip Amid Massive Losses On DRAM & NAND

Samsung Begins to Produce Third 3nm Chip Amid Massive Losses On DRAM & NAND

July 28, 2023
Rackspace Restores Systems After Security Incident

Rackspace Restores Systems After Security Incident

December 6, 2022

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
How To Install Tiny11 for Arm64 on Raspberry Pi 4

How To Install Tiny11 for Arm64 on Raspberry Pi 4

February 19, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Hackers behind MGM cyberattack thrash the casino’s incident response

Hackers behind MGM cyberattack thrash the casino’s incident response

September 16, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

How to merge albums of the same person or pet in iOS 17

How to merge albums of the same person or pet in iOS 17

September 24, 2023
90 Minutes With Atari CEO Wade Rosen | All Things Nintendo

90 Minutes With Atari CEO Wade Rosen | All Things Nintendo

September 24, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT