Главная
Study mode:
on
1
Intro
2
Welcome
3
Agenda
4
Cloud is an Operating System
5
Infrastructure is my code
6
Typical AWS application
7
AppSec perspective
8
The challenge
9
What does AWS offer
10
Problems with AWS
11
AWS as an operating system
12
AWS attack surface
13
Merchant insecurity
14
Strict change control
15
API
16
Vulnerabilities
17
Metadata
18
AWS Metadata
19
Examples
20
Controlling API Access
21
Private IP Addresses
22
Lack of Access Control
23
Tags
24
IP Address
25
Lack of Awareness
26
Cloud Atlas
27
Cloud Out
28
Cloud Trail Data
29
Advanced Cap Capabilities
30
Other Tools
31
Questions
Description:
Explore the security challenges and vulnerabilities associated with migrating applications to Amazon Web Services (AWS) in this conference talk from AppSecUSA 2014. Delve into concrete examples and new techniques that reveal "full stack" vulnerabilities in AWS environments, from simple mistakes like exposing credentials to unexpected issues such as XXE injection and data leakage. Learn about a free assessment tool designed to map interactions between infrastructure and code, helping organizations navigate the complexities of AWS security. Gain insights into AWS as an operating system, its attack surface, and common pitfalls in cloud migration. Discover strategies for controlling API access, managing metadata, and leveraging advanced capabilities to enhance security in AWS deployments.

Bringing a Machete to the Amazon: Securing AWS Applications

OWASP Foundation
Add to list
0:00 / 0:00