This week's articles
Incident Response in AWS
#defend, #explain, #monitor
Post intended to help those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.
AWS IAM Interview Questions
#aws, #explain
Some AWS IAM interview questions to help understand how much an engineer might know about AWS IAM, and how to apply it.
SMTP Matching Abuse in Azure AD
#attack, #azure
How SMTP matching can be abused to obtain privileged access via eligible role assignments, and how to prevent it.
Automating Azure Abuse Research - Part 2
#attack, #azure
Second part of a series, this time focusing on how to use the BloodHound Attack Research Kit (BARK) to perform so-called "continuous abuse primitive validation".
|