Главная
Study mode:
on
1
Intro
2
Cloud is an Operating System
3
Code of the Operating System
4
AWS Application
5
Application Security
6
Servers
7
Digital or Virtual
8
Internet Weather
9
Guaranteed Failure
10
Response vs Control
11
The API
12
What is my new attack surface
13
Physical access
14
Credential exposure
15
Nuke the entire data center
16
Traditional controls
17
API keys
18
The good news
19
How to know quickly
20
Metadata
21
Cloud Metadata
22
Wget
23
Credentials
24
Unintended Proxy
25
Prezi
26
Controlling API Access
27
Dont Use Your Bill as an ID
28
Turn on CloudTrail
29
Excessive Lack of Access Control
30
DevOps Culture
31
Tags
32
EC2 Classic
33
AWS Buckets
34
Full Stack Hack
35
Big Systems
36
Making Life Easier
37
Permissions Analysis
38
Track Change
39
Other Tools
40
Questions
Description:
Explore the security challenges and vulnerabilities of migrating to and operating in Amazon Web Services (AWS) in this 47-minute Black Hat conference talk. Delve into the concept of "full stack" vulnerabilities and learn about new security pitfalls that arise when transitioning to the AWS Cloud. Discover unexpected and unintended ways applications and infrastructure may be exposed to attacks due to misunderstandings, ignorance, or malicious actors. Gain insights into assessing AWS applications, mapping interactions between infrastructure and code, and achieving clarity in the Amazon Cloud environment. Learn about topics such as cloud metadata, credential exposure, API access control, and DevOps culture. Understand the importance of proper permissions analysis, change tracking, and utilizing appropriate tools to enhance security in AWS deployments.

Bringing a Machete to the Amazon

Black Hat
Add to list