<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Steyn Huizinga</title><link>https://www.steynhuizinga.nl/tags/security/</link><description>Recent content in Security on Steyn Huizinga</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Thu, 28 Sep 2023 09:00:00 +0200</lastBuildDate><atom:link href="https://www.steynhuizinga.nl/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Improving IAM policies</title><link>https://www.steynhuizinga.nl/2023/09/improving-iam-policies/</link><pubDate>Thu, 28 Sep 2023 09:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2023/09/improving-iam-policies/</guid><description>&lt;h1 id="security-is-a-shared-responsibility"&gt;Security is a shared responsibility&lt;/h1&gt;
&lt;p&gt;As you might have read in my previous posts, public cloud itself should be considered as very secure. For major cloud providers such as AWS security is key. Security incidents would destroy AWS&amp;rsquo; business so they are fully committed to prevent this from happening. Their almost unlimited access to security talent, extensive knowledge, years of experience, enormous budget, benefit of building things from scratch etc etc are indicators that security is serious business. And looking at the reported incidents compared to the size and scope of their services is impressive. If you are wondering which incidents have been reported, see &lt;a href="https://aws.amazon.com/security/security-bulletins/"&gt;here&lt;/a&gt;. No doubt about security &lt;em&gt;of&lt;/em&gt; the cloud.&lt;/p&gt;</description></item><item><title>Limiting access using geographic restrictions</title><link>https://www.steynhuizinga.nl/2022/03/limiting-access-using-geographic-restrictions/</link><pubDate>Thu, 03 Mar 2022 15:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2022/03/limiting-access-using-geographic-restrictions/</guid><description>&lt;p&gt;The world is on fire. We&amp;rsquo;re heading towards - or exactly it already is - a humanitarian disaster in Ukraine. We&amp;rsquo;ve all seen the heartbreaking footage from the war. Thousands of homeless people fighting and fearing for their lives. I&amp;rsquo;ve written this blog to help. I do know that a large number of government websites are hosted on AWS.&lt;/p&gt;
&lt;p&gt;The conflict between Ukraine and Russia is expanding with cyber warfare. There is fighting on the ground, but also online. Government websites are taken down, broadcasting companies are being hacked, etc. Everything is done to manipulate and disrupt communication technologies. Although most attacks will be sophisticated, there are some simple measurements in AWS you can take to make it more difficult for attackers. It will not be 100% waterproof. Hackers often use Tor-networks and Command and Control-machines. But every bit helps.&lt;/p&gt;</description></item><item><title>Amazon Inspector 2 - What's new?</title><link>https://www.steynhuizinga.nl/2022/01/amazon-inspector-2-whats-new/</link><pubDate>Mon, 03 Jan 2022 11:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2022/01/amazon-inspector-2-whats-new/</guid><description>&lt;p&gt;Six years after the initial launch AWS announced the new Amazon Inspector. The launch took place during re:Invent 2021. With this launch the previous version has been renamed to Amazon Inspector Classic. The new Amazon Inspector is rearchitected to support a wider range of workloads and simplified workflow management.&lt;/p&gt;
&lt;h1 id="scale-with-simplified-management"&gt;Scale with simplified management&lt;/h1&gt;
&lt;p&gt;The management of Inspector 2 has been simplified. Enabling and configuring the service can be done with a few API calls or, if you persist on manual labor, a few clicks in ClickOps. To give an idea of the steps needed to enable Inspector for both existing and new member accounts, the steps are listed below.&lt;/p&gt;</description></item><item><title>Data &amp; Security in the cloud</title><link>https://www.steynhuizinga.nl/2021/11/data-security-in-the-cloud/</link><pubDate>Tue, 02 Nov 2021 12:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/data-security-in-the-cloud/</guid><description>&lt;p&gt;Martijn Doedens (Cloud Security Consultant at Oblivion) and Niels Zeilemaker (CTO at GoDataDriven) summarise the current state of secure data processing in the (AWS) cloud. We cover the specific services related to data and the services that are used to standardise secure landing zone, actual risks and threats that our customers face when processing big data on AWS and which configurations (aka best practices) you should always implement.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/e1n8Gv5y7RY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Data &amp;amp; Security in the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>Securing your secrets in the cloud</title><link>https://www.steynhuizinga.nl/2021/11/securing-your-secrets-in-the-cloud/</link><pubDate>Tue, 02 Nov 2021 12:00:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/securing-your-secrets-in-the-cloud/</guid><description>&lt;p&gt;Have you spotted access keys in code? Putting it directly in your code might not be a good idea. Maybe you saw that Kubernetes offers secrets for this. Have you found your Kubernetes secrets to be readable by everyone? So where do you put your secrets in a secure way? In this session we will look at various solutions, such as Hashicorp Vault, Kubernetes, and solutions offered by AWS.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/lXMRTP5eg9Q?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Securing your secrets in the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>Threat detection and response in the cloud</title><link>https://www.steynhuizinga.nl/2021/11/threat-detection-and-response-in-the-cloud/</link><pubDate>Tue, 02 Nov 2021 11:30:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/11/threat-detection-and-response-in-the-cloud/</guid><description>&lt;p&gt;In this session we talk about how to do detection and response in the AWS public cloud and what native AWS services can be used to do this. What options are available and what (if any) 3rd party solutions play a role here? If it was up to us, what are the top use cases a security operations.
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/Z4V6uDmptAY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="Threat detection and response in the cloud"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/p&gt;</description></item><item><title>First glance at AWS CloudFormation Guard 2.0</title><link>https://www.steynhuizinga.nl/2021/05/first-glance-at-aws-cloudformation-guard-2.0/</link><pubDate>Tue, 18 May 2021 22:15:00 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/05/first-glance-at-aws-cloudformation-guard-2.0/</guid><description>&lt;p&gt;Yesterday AWS CloudFormation Guard version 2.0 was &lt;a href="https://aws.amazon.com/blogs/mt/introducing-aws-cloudformation-guard-2-0/"&gt;introduced&lt;/a&gt;. Guard is an open source tool that can be used to validate CloudFormation templates against certain rules. You can use it for linting your templates both on syntax and semantics. Linting tools are essential in CI/CD pipelines and an powerful addition when it comes to validating structured and human-readable files such as JSON and YAML. In your delivery pipelines you would preferably run linting tests as early as possible, before proceeding to steps such as compile and deploy steps et cetera(fail-fast).&lt;/p&gt;</description></item><item><title>Defense in depth matters</title><link>https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/</link><pubDate>Wed, 12 May 2021 22:10:56 +0200</pubDate><guid>https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/</guid><description>&lt;p&gt;Recently a nasty vulnerability in AWS CloudShell was reported by Google’s Project Zero. Due to a bug in the library handling interaction with the shell and the browser an attacker could trigger remote code execution. AWS CloudShell is a browser based shell which gives a pre-authenticated web-based shell. The service most-often used by a user with administrator privileges on the AWS console.&lt;/p&gt;
&lt;p&gt;Via remote shell the credentials of the user starting AWS CloudShell can be obtained and can be used to call AWS services. Needless to say what the potential impact could have been. It would be easy to blame the developers for this vulnerability, but that would be too short sighted. In general we all know that software is written by humans and that humans are prone to error. We need a more comprehensive approach to protect our digital assets and reputation.

&lt;a href="https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/naarden-vesting.jpeg" data-dimbox data-dimbox-caption="Naarden-Vesting: Dutch version of defence in depth"&gt;
 &lt;img alt="Naarden-Vesting: Dutch version of defence in depth" src="https://www.steynhuizinga.nl/2021/05/defense-in-depth-matters/naarden-vesting.jpeg"/&gt;
&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Optimizing your security footprint in AWS — part 2</title><link>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-2/</link><pubDate>Wed, 31 Mar 2021 09:34:32 +0100</pubDate><guid>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-2/</guid><description>&lt;p&gt;In the last few years the costs for running security went skyrocketing. We’ve seen an explosion of security solutions, all fighting for their own place in cybersecurity. I’m pretty sure each solution has its purpose, but from a CISO perspective the landscape is getting more complex and more expensive each year, or friendly phrased: less cost-effective.&lt;/p&gt;
&lt;p&gt;Public cloud is the main driver for innovation. With the arrival of new thinking, new capabilities and reinventing how we run IT things have changed tremendously.&lt;/p&gt;</description></item><item><title>Optimizing your security footprint in AWS — part 1</title><link>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-1/</link><pubDate>Tue, 23 Mar 2021 14:17:49 +0100</pubDate><guid>https://www.steynhuizinga.nl/2021/03/optimizing-your-security-footprint-in-aws-part-1/</guid><description>&lt;p&gt;In the last few years the costs for running security went skyrocketing. We’ve seen an explosion of security solutions, all fighting for their own place in cybersecurity. I’m pretty sure each solution has its purpose, but from a CISO perspective the landscape is getting more complex and more expensive each year, or friendly phrased: less cost-effective.&lt;/p&gt;
&lt;p&gt;Public cloud is the main driver for innovation. With the arrival of new thinking, new capabilities and reinventing how we run IT things have changed tremendously.&lt;/p&gt;</description></item></channel></rss>