Release Date: 30/01/2022 | Issue: 122
Know someone who'd find this useful? Forward this email
CloudSecList is a newsletter for busy professionals who want to keep up to date with the cloud security industry. Hand-curated by Marco Lancini.
Sponsor

Cloud Security Autopilot
Securing the cloud isn't easy, regardless of your team's size. It's not enough to just detect issues - they need to be investigated, context of environment understood, and then fixed.
Imagine if you could secure your cloud automatically. ARGOS finds, investigates and fixes cloud vulnerabilities - automatically, with safe rollback. We automated the most common security checks, so you don't have to.
Visualise exploitable issues with context - view the entire kill chain. Say good-bye to tedious and soul-sucking analysis - connect your cloud environment in minutes with a free 14-day trial.

This week's articles


CVE-2022-0185 in Linux Kernel Can Allow Container Escape in Kubernetes
A high-severity CVE was released that affects the Linux kernel, allowing unprivileged users to escalate those rights to root and escape from the container.   #attack   #containers   #kubernetes


Securing Terraform monorepo CI
Post explaining the security problems the Mercari team faced in their Terraform environment, and how they improved the situation.   #ci/cd   #defend   #terraform


Catalog of AWS Customer Security Incidents
This repository seeks to index all publicly disclosed AWS customer security incidents with a known root cause.   #attack   #aws


Kubernetes protection in Amazon GuardDuty
GuardDuty can now monitor Kubernetes clusters within your AWS environment.   #aws   #monitor


How I Discovered Thousands of Open Databases on AWS
A writeup describing the journey on finding and reporting databases with sensitive data about Fortune-500 companies, hospitals, crypto platforms, startups, and more.   #attack   #aws


Why you need to update your risky default EMR managed roles and policies
Post examining EMR's default roles and managed policies to understand if they follow security best practices of least privileges.   #aws   #iam


Kubernetes Vault Integration via Sidecar Agent Injector vs. CSI Provider
A detailed comparison of two HashiCorp-supported methods for HashiCorp Vault and Kubernetes integration.   #explain   #kubernetes   #vault


Handling Auth in EKS Clusters: Setting Up Kubernetes User Access Using AWS IAM
How to get authentication working correctly in EKS from the beginning.   #aws   #build   #kubernetes


ISTIO-SECURITY-2022-002
Istio version 1.12.0 and 1.12.1 are vulnerable to a privilege escalation attack. Users who have CREATE permission for gateways.gateway.networking.k8s.io objects can escalate this privilege to create other resources that they may not have access to, such as Pod.   #attack   #kubernetes

Tools


Stratus Red team
Stratus Red Team is "Atomic Red Teamβ„’" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner.


HOUDINI
Hundreds of Offensive and Useful Docker Images for Network Intrusion.


SneakyEndpoints
Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints.


cosign-keyless-admission-webhook
Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect.


DevOps-The-Hard-Way-AWS
This repository contains free labs for setting up an entire workflow and DevOps environment from a real-world perspective in AWS.

From the cloud providers


#AWS   Amazon GuardDuty Enhances Detection of EC2 Instance Credential Exfiltration
GuardDuty has now the ability to detect when your EC2 instance credentials are being used from another AWS Account.


#AWS   Guidelines for Implementing AWS WAF
A new whitepaper from AWS which outlines recommendations for implementing AWS WAF to protect existing and new web applications.


#AWS   How to enable secure seamless single sign-on to Amazon EC2 Windows instances with AWS SSO
How to provide a single sign-in experience to Windows EC2 instances using AWS Fleet Manager with AWS SSO, enabling you to login with your AWS SSO identity, or any supported identity provider to AWS SSO.


#AWS   How to enrich AWS Security Hub findings with account metadata
How to deploy a solution to enrich AWS Security Hub findings with additional account-related metadata, such as the account name, the Organization Unit (OU) associated with the account, security contact information, and account tags.


#AWS   How to use tokenization to improve data security and reduce audit scope
Post providing guidance to determine your requirements for tokenization, with an emphasis on the compliance lens.


#GCP   GCP controls to leverage for building a secure and compliant data pipeline
A set of controls to leverage when creating data products in compliance with security and regulatory requirements using Google Cloud services.


#GCP   Google Cloud VPC-Service Controls: Lessons Learned
Some lessons learned while applying the VPC-Service Controls (a.k.a. VPC-SC) to one complex network infrastructure.

Thanks for reading!

If you found this newsletter helpful, I'd really appreciate if you could forward it to your friends and colleagues! πŸ‘Œ

If you have questions, comments, or feedback, let me know on Twitter (@lancinimarco / @CloudSecList), or at feedback.cloudseclist.com!

Thanks,
Marco
Forward Forward
Twitter Tweet
Share Share

How did you like this issue of CloudSecList?

1       2       3       4       5

Archives View in browser Sponsorship
Β© 2019-present, CloudSecList by Marco Lancini.