This week's articles
Anatomy of a Cloud Infrastructure Attack via a Pull Request
#attack, #ci/cd
In April 2021, an attack vector was discovered that could allow a malicious Pull Request to a Github repository to gain access to Teleport's production environment. Open source companies, or anyone else who accepts external contributions, are especially vulnerable to this.
It's tough being an Azure fan
#azure, #strategy
Even as a user and somewhat of a fan of the Azure technology, it is proving increasing difficult to recommend.
Top 20 Dockerfile best practices
#docker, #explain
How to prevent security issues and optimize containerized applications by applying a quick set of Dockerfile best practices in your image builds.
|
|
Tools
rover
Interactive Terraform visualization. State and configuration explorer.
k8s_gateway
A CoreDNS plugin to resolve all types of external Kubernetes resources.
aws-cloudformation-iam-policy-validator
A command line tool that takes a CloudFormation template, parses the IAM policies attached to IAM roles, users, groups, and resources then runs them through IAM Access Analyzer validation checks.
org-formation-cli
AWS Organization Formation is an Infrastructure as Code (IaC) tool for AWS Organizations.
|
|
Sponsor CloudSecList
If you want to get yourΒ productΒ or job ad in front of thousands of security professionals, ranging from engineers to CISOs and VCs, at companies ranging from small start-ups to Fortune500 and FAANG, you can reach out at π¨ [email protected] π¨
|
|
|
From the cloud providers
AWS Security Hub adds 18 new controls to its Foundational Security Best Practices
AWS Security Hub has released 18 new controls for its Foundational Security Best Practice standard to enhance customers' cloud security posture monitoring. These controls conduct fully-automatic checks against security best practices for API Gateway, EC2, ECS, Elastic Load Balancing, Elasticsearch, RDS, Redshift, and SQS.
Improve your security posture with new Overly Permissive Firewall Rule Insights
Google introduced a new module within Firewall Insights called "Overly Permissive Firewall Rule Insights", which allows customers to rely on GCP to automatically analyze massive amounts of firewall logs and generate easy-to-understand insights and recommendations to help them optimize their firewall configurations and improve their network security posture.
|
|
Thanks for reading!
|
If you found this newsletter helpful, I'd really appreciate if you could forward it to your friends and colleagues! π If you have questions, comments, or feedback, let me know on Twitter ( @lancinimarco / @CloudSecList), or at feedback.cloudseclist.com! Thanks, Marco
|
|
|