July 16, 2022, 6 a.m. | SANS Cloud Security

SANS Cloud Security www.youtube.com

There are two main problems at Cloud Security World: IAM Permissions & Control Plane Misconfigurations.

In the current Cloud Security World, access keys are the new perimeter, and permissions associated with those keys are the limits for this perimeter. So most of the time, initial vectors to get into some company cloud environments are leaked keys. There are a couple of ways to have access to a key as:

Portal / API (creation time)

Application

Metadata (http://169.254.169.254)

Code Leak

Endpoint …

access aws elastic elastic stack iam privileges

Network Security Tools Engineer / Systems Engineer

@ Node.Digital | Arlington, Virginia, United States

Scrum Master II - Global Information Security PMO

@ Marriott International | Bethesda, MD, United States

Principle Security Incident Response Analyst

@ Oracle | United States

Cyber Network Engineer

@ Peraton | Aberdeen Proving Ground, MD, United States

Red Team Operator: Assessments & Exercises Vice President

@ JPMorgan Chase & Co. | Columbus, OH, United States

Cybersecurity Undergraduate - Internship

@ esure Group | Reigate, United Kingdom