Release Date: 20/10/2019 | Issue: 8
CloudSecList is a newsletter for busy professionals who want to keep up to date with the cloud security industry. Hand-curated by Marco Lancini.

If you received it, you either subscribed or someone forwarded it to you. If you fit in the latter camp and want to subscribe, then you can click on this button:
Sign Up

This week's articles

Introducing Twilio's SOCless: Automated Security Runbooks
Twilio just released SOCless, a serverless framework built to help organizations easily automate their incident response and operations processes, so to respond to threats quickly and at scale. The idea behind SOCless is to have security teams focusing on designing their runbooks, while SOCless executes them both quickly and effectively in response to threats.

How Dropbox Security builds tools for threat detection and incident response
This week has been strong on incident detetcion and alerting apparently, with also the Dropbox Detection and Response Team (DART) discussing their alerting and response pipeline, which uses Kafka, Python and Jupyter notebooks to create new tools. Alertbox was the first project built to start cutting down their triage time. The goal was to move the DART's alert response runbooks into code, and have them execute before even beginning the triage process.

What's Next for Vault and Kubernetes
Hashicorp is considering releasing a plugin for Kubernetes designed to mount Vault secrets in a Pod. Injecting Vault secrets into Pods via a sidecar will enable more automatic access to secrets within the context of applications that don’t have native Vault logic built-in. This will allow applications to only concern themselves with finding a secret at a filesystem path, rather than managing the auth tokens and other mechanisms for direct interaction with Vault.

Beyond The Security Team
This is the transcript of the keynote Julien Vehent delivered at DevSecCon Seattle in September 2019. Julien talks about his really interesting journey within the security industry, and describes how you should really get the security team closer to your organization.

How the scorecard works
This is a post from Chris Farris which I didn't appreciate enough when it was first published (but I'm redeeming myself now). The post describes a process to perform inventory and generate scorecards on an hourly basis using the basic building block of AWS, as well as announcing the release of Antiope, an Inventory and Compliance Framework for AWS. I'm very curious to see how this approach could be adapted to GCP.

Security Program Tactics. A thread.
When starting or reinvigorating a security program, focus on a small number of meta-objectives that can have sustained outsize effects - as well as diving into the immediate and very specific things that need improving.

The AWS SecurityAudit policy received some new privileges
In case you didn't know, Scott Piper continuously scans for modifications of the AWS managed policies.

Amazon CloudWatch Anomaly Detection
CloudWatch just announced Anomaly Detection, which aims to help avoiding manual configuration and experimentation, and can be used in conjunction with any standard or custom CloudWatch metric that has a discernible trend or pattern.

Thanks for reading!

If you found this newsletter helpful, I'd really appreciate if you could forward it to your friends and colleagues! πŸ‘Œ

If you have questions, comments, or feedback, let me know on Twitter (@lancinimarco / @CloudSecList), or at!

Forward Forward
Twitter Tweet
Share Share

How did you like this issue of CloudSecList?

1       2       3       4       5

Archives View in browser Sponsorship
Β© 2019-present, CloudSecList by Marco Lancini.