Tuesday, May 25, 2021

AWS IAM security explained

Executive summary
AWS Policies are a key foundation in good cloud security, but they are often overlooked. In this blog, we take a quick look on some AWS Policies, particularly for Identity and Access Management (IAM), that could become problematic if not properly managed. We'll discuss how they can be used against us to generate attacks like: Ransomware, data exfiltration, credential abuse, and more. Finally, we'll suggest some Open Source tools for cloud policy assessment and pentesting.  
Analysis
The first step in achieving good security is having effective policies to regulate what can and cannot be done in an environment, both physical devices and cloud infrastructure. These regulatory policies are frequently hard to define and keep up-to-date, especially in a fast-paced environment using infrastructure-as-a-service (IaaS). This blog looks at some changes in policies which can reduce success in some common attack types involving:…

Fernando Martinez Posted by:

Fernando Martinez

Read full post

      

The post AWS IAM security explained appeared first on Cybersecurity Insiders.


May 26, 2021 at 09:10AM

0 comments:

Post a Comment