hotnopsinPosts By SpecterOps Team Members·8 hours agoI’d TAP That PassSummary: Given that: Temporary Access Passes (TAP) are enabled in the Azure AD tenant AND You have an authentication admin role in Azure AD You can assign users a short lived password called a Temporary Access Pass (TAP) that satisfies most multi-factor authentication requirements implemented in Azure AD conditional access without…Cloud Security15 min readCloud Security15 min read
WayneReidUK·1 day agoPart 1 — “Unlock the Secrets to Securing Your ML and AI Data in the Cloud — Essential Tips and Best Practices Revealed!”A 4-Part Series on Essential Strategies and Best Practices in AI & ML! SERIES 1 of 4 Hello and welcome to my Cloud Security in ML and AI Community Group blog! I am excited to share my insights and experiences on securing ML and AI data in the cloud with…Cloud Security4 min readCloud Security4 min read
Gennadii Aleksandrov·2 days agoHow to automate MFA-enabled AWS CLI accessWhen it comes to securing AWS console access, we all know that enabling multi-factor authentication (MFA) is a best practice. It is a quite straightforward process, well documented in the IAM user guide. But what about accessing MFA-protected AWS accounts via CLI? It is not that easy. And that’s what…Cloud Security2 min readCloud Security2 min read
Josh S·2 days agoAWS Security Specialist Certified: Strengthening My Cloud Security PortfolioIntroduction Passing the AWS Security Specialist exam was a challenging but rewarding experience that helped me gain a deeper understanding of cloud security architectures and technologies. In this blog post, I will share my journey to passing the exam, including how I approached the exam format, managed my time, and studied…Cloud Security3 min readCloud Security3 min read
Alexander Smith·19 hours agoZero-Trust and Defense-in-Depth: Two Pillars of Network SecurityNetwork security has become a critical concern for organizations of all sizes and types, as cyber threats continue to evolve and become more sophisticated. To protect their networks, organizations need to adopt a multi-layered security approach that can provide comprehensive protection against various types of cyber-attacks. In this article, we…Cloud Security4 min readCloud Security4 min read
Teri RadichelinCloud Security·1 day agoMember-onlySCP to Allow Closing and Removing AWS Accounts — Part 3ACM.183 Trying out the new AWS billing actions in our SCP — Part of my series on Automating Cybersecurity Metrics. The Code. In my last post, I spent far too long messing around with deprecated AWS IAM billing actions. SCP to Allow Closing and Removing AWS Accounts — Part 2 ACM.183 Using CloudTrail to troubleshoot a Service Control Policy and the mysterious GetAccountPreferences actionmedium.com AWS updated billing options for IAM PoliciesCloudsecurity9 min readCloudsecurity9 min read
Mike Boutwell·1 day agoThe evolving landscape of cyber threats: what to expect in 2023Introduction: The ever-evolving landscape of cyber threats is a constant concern for businesses and individuals alike. With the increasing reliance on technology, the threat of cyber attacks has become a major issue for organizations across industries. In recent years, the number and sophistication of cyber threats have grown at an alarming…Cloud Security3 min readCloud Security3 min read
Shellmates Club·3 days agoAmazon cognito misconfigurationwritten by Mohamed Lakhdar Metidji In recent years, Amazon Web Services (AWS) has become a popular choice for businesses looking to host their web applications in the cloud. One of the most widely used AWS services is Amazon Cognito, a user authentication and identity management service. …Cloud Security8 min readCloud Security8 min read
Teri RadichelinCloud Security·3 days agoMember-onlyRoot SCP Fails to Disable Root Actions — Troubleshooting SCPs181. Also, test your policies, and monitor for inadvertent or malicious changes — Part of my series on Automating Cybersecurity Metrics. The Code. In the last post in this series we took a look at a potential structure for an AWS Organization. Now I’m going to work on implementing that. But first we have some cleanup and testing to perform. Defining AWS Accounts and Organizational Units ACM.180 Defining accounts and organizational units based on by trust boundaries and roles to protect critical assetsmedium.comCloud Security7 min readCloud Security7 min read
Avnish pathak·3 days ago“Compliance in the Cloud: Best Practices for Meeting Regulatory Requirements” #CloudSecurityCloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … This is the last post in the #CloudSecurity series. We’ve reached the end of our cloud security series, and I hope you’ve enjoyed it and gained valuable…Cloud Security3 min readCloud Security3 min read