Главная
Study mode:
on
1
Intro
2
Kill Chains and ATT&CK'S
3
Objectives
4
Common sources of credential exposure
5
Static API Credential Exposure to Account Hijack
6
Compromised Server via Exposed SSH/RDP/Remote Access
7
Compromised Database via Inadvertent Exposure
8
RSAConference2020
9
Object Storage Public Data Exposure (53, Azure Blob)
10
Oops, my bad...
11
Server Side Request Forgery - Credential Abuse
12
Demo
13
Cryptomining
14
Network Attack
15
Compromised Secrets (Instance/VM)
16
Novel Cloud Data Exposure and Exfiltration
17
Subdomain Takeover
18
Non-Killchain Related Issues
19
Contributing Factors
20
Apply
Description:
Explore the top 10 cloud attack kill chains and learn effective strategies to disrupt them in this informative RSA Conference talk. Gain insights from industry experts as they break down each step of the kill chain, identify the most vulnerable points, and discuss common security defenses that work across multiple chains. Discover how to protect against credential exposure, account hijacking, server compromises, database vulnerabilities, and object storage risks. Delve into topics such as server-side request forgery, cryptomining, network attacks, and novel cloud data exposure techniques. Understand contributing factors and apply practical knowledge to enhance your cloud security posture. Suitable for those with basic technical knowledge of public cloud providers like AWS, Azure, and GCP.

Break the Top 10 Cloud Attack Killchains

RSA Conference
Add to list
0:00 / 0:00