A C2 Channel on WordPress to Access AWS IAM Role Credentials

ACM.8 Your applications are the gateway to your cloud

Teri Radichel
Cloud Security

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: IAM | AWS Security | Application Security | Data Breaches

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

In the last post, we considered some of the things we will need to do to secure containers in our batch job architecture that we are creating to help with cybersecurity metrics reporting and automation.

How could an attacker use a container or some other resource in a cyber attack?

In this post, I’m going to share a lab (generally, not the exact lab) that I used to include in my 5-day cloud security class. The lab demonstrates how an attacker might gain access to an application…

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award