all InfoSec news
Speeding Up AWS IAM Least Privileges with Cloudsplaining, Elastic Stack, & AWS Access Analyzer
July 16, 2022, 6 a.m. | SANS Cloud Security
SANS Cloud Security www.youtube.com
In the current Cloud Security World, access keys are the new perimeter, and permissions associated with those keys are the limits for this perimeter. So most of the time, initial vectors to get into some company cloud environments are leaked keys. There are a couple of ways to have access to a key as:
Portal / API (creation time)
Application
Metadata (http://169.254.169.254)
Code Leak
Endpoint …
More from www.youtube.com / SANS Cloud Security
Secure Service Configuration Poster Resource Demo
1 month, 3 weeks ago |
www.youtube.com
Multicloud Command Line Cheat Sheet Resource Demo
2 months, 1 week ago |
www.youtube.com
Webcast Cloud Flight Simulator Part 3 Safeguarding the Software Supply Chain
2 months, 3 weeks ago |
www.youtube.com
Cloud Flight Simulator Part 2: Protecting Kubernetes Clusters with Admission
2 months, 4 weeks ago |
www.youtube.com
Cloud Flight Simulator Part 1: GitLab CI, Workflows, and Secrets
3 months, 1 week ago |
www.youtube.com
2024 Cloud Security Trends and Predictions
3 months, 3 weeks ago |
www.youtube.com
Nate Lee: Building a GenAI Security App for Fun (and No Profit) | Season 2, …
4 months, 3 weeks ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
Network Security Tools Engineer / Systems Engineer
@ Node.Digital | Arlington, Virginia, United States
Scrum Master II - Global Information Security PMO
@ Marriott International | Bethesda, MD, United States
Principle Security Incident Response Analyst
@ Oracle | United States
Cyber Network Engineer
@ Peraton | Aberdeen Proving Ground, MD, United States
Red Team Operator: Assessments & Exercises Vice President
@ JPMorgan Chase & Co. | Columbus, OH, United States
Cybersecurity Undergraduate - Internship
@ esure Group | Reigate, United Kingdom