Building Custom Scenarios with CNAPPgoat

| | Cloud
You can now construct and import your own vulnerability scenarios into CNAPPgoat, enhancing your cloud security skills The post Building Custom Scenarios with CNAPPgoat appeared first on Ermetic ... Read More
AWS re:Inforce 2022 - AWS Identity and Access Management (IAM) deep dive (IAM301)

Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433

| | aws
One of the most talked-about sessions at AWS re:Inforce, and my favorite, was IAM433, on AWS IAM’s internal evaluation mechanisms The post Diving Deeply into IAM Policy Evaluation – Highlights from AWS re:Inforce IAM433 appeared first on Ermetic ... Read More
"Access Undenied: Automatically discovering reasons for Access Denied messages in IAM" - Noam Dahan

Access Undenied on AWS

| | aws
Ermetic is launching a new open-source tool: Access Undenied on AWS. The tool parses AWS AccessDenied CloudTrail events, explains the reasons for them and offers actionable fixes. The post Access Undenied on AWS appeared first on Ermetic ... Read More
In the GCP console, the page where keys are created

Wayward Sheriffs and Confused Deputies: Risks in GCP Third Party Access

| | gcp
Most GCP third-party vendors ask for permanent service account keys for access -- increasing credential leakage risk. Used correctly, short-lived credentials offer a secure alternative. The post Wayward Sheriffs and Confused Deputies: Risks in GCP Third Party Access appeared first on Ermetic ... Read More
Creating Data Event Store in CloudTrail

Testing the Waters: First Impressions of CloudTrail Lake

| | aws
Our first impressions of AWS's new managed audit and security lake that allows you to aggregate, immutably store, and query activity logs. The post Testing the Waters: First Impressions of CloudTrail Lake appeared first on Ermetic ... Read More
access advisor result

Auditing PassRole: A Problematic Privilege Escalation Permission

| | Blog
TL;DR: iam:PassRole is an AWS permission that enables critical privilege escalation; many supposedly low-privilege identities tend to have it It’s hard to tell which IAM users and roles need the permission We have mapped out a list of AWS actions where it is likely that iam:PassRole is required and the ... Read More
Orion permissions

Cloud infrastructure is not immune from the SolarWinds Orion breach

| | Blog
Until now much of the discussion around the SolarWinds breach that hacked FireEye and compromised US government networks has focused on the on-premise risks. However the cloud infrastructure of the impacted organizations is not necessarily immune. That’s because the SolarWinds Orion platform can also be deployed in cloud environments, where ... Read More