cloud security
play

Cloud Security An IAM GAME Nathaniel Beckstead whoami I am here - PowerPoint PPT Presentation

Cloud Security An IAM GAME Nathaniel Beckstead whoami I am here because I love to give presentations. @scriptingislife https:/ /scriptingis.life https:/ /glimpseid.com 2 What is the cloud? 3 What is the cloud? 4 What is the cloud? 5


  1. Cloud Security An IAM GAME Nathaniel Beckstead

  2. whoami I am here because I love to give presentations. @scriptingislife https:/ /scriptingis.life https:/ /glimpseid.com 2

  3. What is the cloud? 3

  4. What is the cloud? 4

  5. What is the cloud? 5

  6. “Definitions” ▪ EC2 - Virtual Machine but in the cloud ▪ S3 - Key-value storage (mostly for files) ▪ DynamoDB - NoSQL database 6

  7. 7

  8. Why is it so hard to secure? ▪ It’s not 8

  9. 9

  10. What’s different about the cloud? ▪ Speed ▪ IaaS, PaaS, SaaS ▪ No rules! 10

  11. https://www.episerver.com/learn/resources/blog/fred-bals/pizza-as-a-service/ 11

  12. What is IAM? ▪ Identity and Access Management ▪ Users, API Keys, Roles, Policies ▪ Omnipresent in the cloud 12

  13. Roles ▪ Like a user, but can be assumed by anyone who needs it. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html 13

  14. Roles 14

  15. Policies ▪ Defines permissions for an action. https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#targetText=Policies%20and%20Permissio ns,or%20resource%2C%20defines%20their%20permissions. 15

  16. Access Keys ▪ Used for programmatic access 16

  17. https://blog.trendmicro.com/the-code-spaces-nightmare/ 17

  18. Why is IAM so hard? ▪ It’s complicated. 18

  19. Why is IAM so hard? 19

  20. Why is IAM so hard? 20

  21. Why is IAM so hard? 21

  22. Why is IAM so hard? 22

  23. Why is IAM so hard? 23

  24. Why is IAM so hard? 24

  25. Why is IAM so hard? ▪ It’s preventive. Every developer using the cloud. (Circa 2019) 25

  26. AWS Metadata Service 26

  27. AWS Metadata Service 27

  28. Capital One ▪ Some application was vulnerable to SSRF ▪ WAF let SSRF through ▪ Role had read access to all S3 buckets 28

  29. What is the solution? ▪ Cloud is special ▪ Least privilege is best privilege ▪ Monitor API key usage ▪ Automate, automate, automate 29

  30. Least Privilege in AWS AWS Access Advisor 30

  31. https:/ /expel.io/blog/ Resources https:/ /flaws.cloud https:/ /flaws2.cloud

  32. Questions? 32

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend