• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

AWS Security. A compilation of stories written about… | by Teri Radichel | Cloud Security | Nov, 2022

flyytech by flyytech
November 29, 2022
Home Security
Share on FacebookShare on Twitter


A compilation of stories written about AWS by Teri Radichel

There’s over 100 posts in this series which walks through implementing a secure AWS architecture with governance and not done…not going to repeat all these here so check out the links in the following post.

Temporary access to log into an AWS VM using an AWS IOT Button

What is interesting about this particular post is that after publishing it, Azure implemented something called Just In Time access (JIT) on Azure with Privileged Access Management (PIM). You get limited access to a VM on Azure and when your time is up, access is shut off. Organizations can require people to request access prior to using it. Now this service is available in Azure for AWS EC2 instances (in preview at the time of this writing).

Why one of your favorite pentesting techniques doesn’t work on AWS

I was surprised just how popular this post has been over time. It was interesting to attend a presentation shortly after posting this at an event put on by an organization I work with. A copy of the diagram in this post was practically copied and put into the deck by the author. A different person was giving the talk with the slides and was surprised to see the slide and couldn’t explain it :-D. Please provide references and give credit when you lift other people’s content.

Amazon DocumentDB Network Access — Why the VPC?

I am continuously trying to explain network security to developers. I often feel like I haven’t done a good enough job because the topic keeps coming up but I’ll keep trying. This is one of those posts.

Keys to AWS Success

Also you might be interested in this summary of Keys to AWS Success from Andy Jassy in a prior AWS re:Invent keynote.

SSH to an AWS EC2 Instance with a Chromebook

My nephew was helping me test my AWS security classes and had a Chromebook. He’s one of the least interested in school and technology in my family and didn’t even last very long after I wrote this post — but ironically is one of my post popular blog posts. (Though not into school or tech he is actually very good at math and just did an amazing job of adding brick pavers to our back yard. Everyone has their own “thing.”)

Easier CloudFormation

Many people struggle with CloudFormation. I think that is in part due to the way it is presented. Hopefully this post makes it easier to get started.

My History of DevSecOps

The first time I heard DevSecOps was when presented by some AWS security gurus at AWS re:Invent. That was part of my journey to AWS security.

.NET AWS Lambda Function

When AWS introduced .NET for AWS Lambda, I took a look. Surprisingly this has also been a very popular post. There must be a lot of people trying out .NET with AWS Lambda!

Zooma! Zoom! Zoom!

I tried running Zoom on an AWS Workspace instance. It worked for a while but had some issues. I wish this work work on a standard EC2 instance because AWS Workspaces are a bit expensive.

Step by step approach to installing Zoom on Amazon Workspaces

The problem I hit was that the driver started failing after initially working. I haven’t got back to testing this further. I am also concerned about the security implications of installing this driver. I installed it on a machine specifically used for communications on a locked down network. I wish AWS would build a solution for this. (If they haven’t yet.)

Cross account AWS IAM roles with external IDs and MFA

I use MFA when performing AWS penetration tests. It works with AWS IAM but not AWS SSO. This post explains how to MFA with the AWS CLI and an external ID. In my first link in this post I have posts on the related security threat that an external ID helps protect against — the confused deputy attack.

Install Go on AWS EC2

Based on my stats, a lot of people are interested in usign golang on AWS.

I wrote about the security benefits of Go here:

Real World Cloud Compromise

I gave a presentation for AWS Women in Tech on AWS application vulnerabilities found on penetration tests.

Serverless Security

In this presentation at RSA 2020 I talked about security services environments and a few issues I found on AWS penetration tests.

Red Team vs. Blue Team on AWS

In this presentation, Kolby Allen and I talk about attacks and defenses on AWS.

Security & Machine Learning

In these posts I explore security and machine learning, and I tried an Amazon DeepRacer.

AWS IAM Role Profiles with Boto3

In this post I explain how to use AWS IAM Roles with Boto3.

Mapping Attack Paths

This post talks about tools I use on AWS penetration tests to map out network attack paths.

AWS 2020 re:Invent Announcements

AWS Resources used in the Solar Winds Breach

This post explains how AWS resources were used in the Solar Winds Breach.

Hackers as Cloud Customers

Explained how attackers used AWS and Azure in the Solar Winds Breach.

What’s in Your Cloud?

My most popular post (sadly) on the Capital One Breach.

Amazon declined to testify at congressional hearing on SolarWinds hack

A post on click bait reporting.

On Becoming an AWS Hero

Container Escape in AWS HotPatch

Follow for updates.

Teri Radichel

If you liked this story please clap and follow:

******************************************************************

Medium: Teri Radichel or Email List: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests services via LinkedIn: Teri Radichel or IANS Research

******************************************************************

© 2nd Sight Lab 2022

____________________________________________

Author:

Cybersecurity for Executives in the Age of Cloud on Amazon

Need Cloud Security Training? 2nd Sight Lab Cloud Security Training

Is your cloud secure? Hire 2nd Sight Lab for a penetration test or security assessment.

Have a Cybersecurity or Cloud Security Question? Ask Teri Radichel by scheduling a call with IANS Research.

Cybersecurity & Cloud Security Resources by Teri Radichel: Cybersecurity and Cloud security classes, articles, white papers, presentations, and podcasts





Source_link

flyytech

flyytech

Next Post
Galax Boasts of 40% Overclock for GeForce RTX 4080 World Record

Galax Boasts of 40% Overclock for GeForce RTX 4080 World Record

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

May 24, 2023
Netflix ‘Basic With Ads’ Plan Announced for $6.99 Per Month

Netflix’s new solution to address password-sharing issue

October 18, 2022

Trending.

Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Light Lens Lab 50mm f/2 Review: The Classic Speed Panchro II Reborn

Light Lens Lab 50mm f/2 Review: The Classic Speed Panchro II Reborn

March 22, 2023
Google 3D animals & AR objects: Full list & gallery

Google 3D animals & AR objects: Full list & gallery

December 27, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

How to Unlock Any Phone Password without Losing Data [2023]

How to Unlock Any Phone Password without Losing Data [2023]

May 29, 2023
Nvidia Unveils DGX GH200 Supercomputer, Grace Hopper Superchips in Production

Nvidia Unveils DGX GH200 Supercomputer, Grace Hopper Superchips in Production

May 29, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT