This week's articles
Bypassing required reviews using GitHub Actions
#attack, #ci/cd
A newly discovered security flaw in GitHub allows leveraging GitHub Actions to bypass the required reviews mechanism and push unreviewed code to a protected branch, potentially allowing malicious code to be used by other users or flow down the pipeline to production.
AWS WAF's Dangerous Defaults
#attack, #aws
AWS WAF's defaults make bypassing trivial in POST requests, even when you enable the AWS Managed Rules.
Are Dockerfiles good enough?
#defend, #docker
There has been a major regression in many organizations, who now tolerate risks inside containers that never would have been allowed on virtual machines. A lot of the blame seems to rest with Dockerfiles: we need guardrails against common mistakes.
VPC Service Controls in Plain English
#explain, #gcp
GCP offers powerful security controls to mitigate API-based data exfiltration called VPC Service Controls. To execute a successful and secure cloud architecture with VPC Service Controls, it is important to understand exactly how they work.
Understanding Azure Logs from a security perspective - Part 2
#azure, #monitor
This blog is the second in a multi-part series to cover the available logs and telemetry of the Azure platform, discuss the security insights that we can obtain from them and also to highlight existing blind spots that can save you a few headaches down the line.
16 things you didn't know about Kube APIs and CRDs
#explain, #kubernetes
If you're familiar with Kubernetes, you're likely familiar with the Kubernetes API and the concept of controllers, but despite the seeming simplicity of the core ideas, there are plenty of details that may be surprising once you scratch the surface.
|