Главная
Study mode:
on
1
Intro
2
An Unanticipated Collision of Features
3
RCE May Not Be The Real Concern
4
Lift 'n' Shift Web App
5
Cloud-native Web App
6
Web Application Firewall
7
Real-world Apps Talk to the Outside World
8
Typical deployment: use a NAT
9
Simple case: Security Group egress rules
10
Alternative: VPC Endpoints
11
Alternative: Internet Proxy
12
Using a Proxy with the Java V2 SDK
13
Network Firewall
14
Application Roles
15
Multi-Account
16
Service Control Policies
17
Secrets, not Environment Variables
18
Cloud Trail Events
Description:
Explore how cloud services can help mitigate vulnerabilities like Log4Shell in Java applications. Learn to block attacks, prevent data exfiltration, protect sensitive information, and perform forensic analysis in cloud environments. Discover strategies for securing web applications, implementing network security measures, and leveraging cloud-native features to enhance overall application security. Gain insights into using Web Application Firewalls, VPC Endpoints, Internet Proxies, and AWS-specific tools like Security Groups and Cloud Trail Events. Understand the importance of proper secrets management and multi-account strategies in maintaining a robust security posture for Java applications deployed in the cloud.

Mitigating Log4Shell and Similar Vulnerabilities Using Cloud Services

ChariotSolutions
Add to list
0:00 / 0:00