Hands-On Workshop: Avoiding Data Disasters: Techniques to Identify & Address Cloud Storage Misconfig
It appears that every few months, there's news of yet another cloud breach stemming from a carelessly configured cloud storage solution. While this isn't the default for most cloud vendors, some users still manage to make their cloud data publicly accessible by going out of their way - sometimes to a significant extent. Whether it's out of ignorance or convenience, it doesn't matter - this practice must come to an end.
To address this issue, we've developed a workshop that equips attendees with various techniques and methods to identify and rectify cloud storage misconfigurations in their own cloud accounts. We'll even demonstrate some ways to prevent these misconfigurations from happening in the first place. Although the chosen vendor for this workshop is AWS, due to its Simple Storage Service (S3) being the one making headlines, misconfigurations could occur in any cloud environment. Hence, the techniques discussed in this workshop will be applicable to all cloud vendor environments, including Azure, Google Cloud Platform, and Oracle.
LEARNING OBJECTIVES:
- Discover all-too-common cloud storage security deficiencies present as either insecure vendor defaults or careless mistakes
- Correct these issues using a variety of means (e.g., cloud management console, command line tools, and Infrastructure-as-Code)
PREREQUISITE KNOWLEDGE:
None.
SYSTEM REQUIREMENTS:
- Laptop with a modern web browser
- AWS account with root access or an IAM user with Administrator Access permissions
- If you need an AWS account, you can create a free tier account with root access at https://aws.amazon.com/free/.
- The cost will be minimal (pennies) to complete the workshop
This workshop supports both:
SEC388: Introduction to Cloud Computing and Security, https://www.sans.org/cyber-security-courses/introduction-cloud-computing-security/ and
SEC488: Cloud Security Essentials, https://www.sans.org/cyber-security-courses/cloud-security-essentials/
About the Speaker
Ryan Nicholson's passion for information technology started in 2001 when he found himself constantly trying to make his high school's computers and even calculators do things that they weren't exactly intended to do. They lacked games, so he learned how to create some. Yes, some may call this hacking. Ryan called it "fun", which led to attending college with intentions of becoming a software engineer. During school, Ryan obtained an internship with a very cybersecurity-minded organization -- the Defense Information Systems Agency (DISA). Ever since then, he’s been hooked on cybersecurity. Ryan is the author for SEC488: Cloud Security Essentials, co-author of SEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection. Learn more about Ryan at https://www.sans.org/profiles/ryan-nicholson/
SANS Cloud Security focuses the deep resources of SANS on the growing threats to The Cloud by providing training, GIAC certification, research, and community initiatives to help security professionals build, deploy and manage secure cloud infrastructure, platforms, and applications.
SANS Cloud Security Curriculum: www.sans.org/cloud-security
GIAC Cloud Security Certifications: https://www.giac.org/focus-areas/cloud-security/
LinkedIn: https://www.linkedin.com/showcase/sanscloudsec/
Discord: www.sansurl.com/cloud-discord
Twitter: @SANSCloudSec
Видео Hands-On Workshop: Avoiding Data Disasters: Techniques to Identify & Address Cloud Storage Misconfig канала SANS Cloud Security
To address this issue, we've developed a workshop that equips attendees with various techniques and methods to identify and rectify cloud storage misconfigurations in their own cloud accounts. We'll even demonstrate some ways to prevent these misconfigurations from happening in the first place. Although the chosen vendor for this workshop is AWS, due to its Simple Storage Service (S3) being the one making headlines, misconfigurations could occur in any cloud environment. Hence, the techniques discussed in this workshop will be applicable to all cloud vendor environments, including Azure, Google Cloud Platform, and Oracle.
LEARNING OBJECTIVES:
- Discover all-too-common cloud storage security deficiencies present as either insecure vendor defaults or careless mistakes
- Correct these issues using a variety of means (e.g., cloud management console, command line tools, and Infrastructure-as-Code)
PREREQUISITE KNOWLEDGE:
None.
SYSTEM REQUIREMENTS:
- Laptop with a modern web browser
- AWS account with root access or an IAM user with Administrator Access permissions
- If you need an AWS account, you can create a free tier account with root access at https://aws.amazon.com/free/.
- The cost will be minimal (pennies) to complete the workshop
This workshop supports both:
SEC388: Introduction to Cloud Computing and Security, https://www.sans.org/cyber-security-courses/introduction-cloud-computing-security/ and
SEC488: Cloud Security Essentials, https://www.sans.org/cyber-security-courses/cloud-security-essentials/
About the Speaker
Ryan Nicholson's passion for information technology started in 2001 when he found himself constantly trying to make his high school's computers and even calculators do things that they weren't exactly intended to do. They lacked games, so he learned how to create some. Yes, some may call this hacking. Ryan called it "fun", which led to attending college with intentions of becoming a software engineer. During school, Ryan obtained an internship with a very cybersecurity-minded organization -- the Defense Information Systems Agency (DISA). Ever since then, he’s been hooked on cybersecurity. Ryan is the author for SEC488: Cloud Security Essentials, co-author of SEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection. Learn more about Ryan at https://www.sans.org/profiles/ryan-nicholson/
SANS Cloud Security focuses the deep resources of SANS on the growing threats to The Cloud by providing training, GIAC certification, research, and community initiatives to help security professionals build, deploy and manage secure cloud infrastructure, platforms, and applications.
SANS Cloud Security Curriculum: www.sans.org/cloud-security
GIAC Cloud Security Certifications: https://www.giac.org/focus-areas/cloud-security/
LinkedIn: https://www.linkedin.com/showcase/sanscloudsec/
Discord: www.sansurl.com/cloud-discord
Twitter: @SANSCloudSec
Видео Hands-On Workshop: Avoiding Data Disasters: Techniques to Identify & Address Cloud Storage Misconfig канала SANS Cloud Security
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Static Analysis of Infrastructure as Code | SANS Cloud Security Summit 2020](https://i.ytimg.com/vi/b3Wy01XXPlQ/default.jpg)
![Zero to Hero in Managing Enterprise Cloud Security](https://i.ytimg.com/vi/Xfq0sTW7cp8/default.jpg)
![Exfiltration Paths in Isolated Environments using VPC Endpoints](https://i.ytimg.com/vi/mFK-GksgopI/default.jpg)
![Self-Healing Infrastructure, GitOps, and Terrascan](https://i.ytimg.com/vi/TC2pROlU6kY/default.jpg)
![Why is Cloud Security an Opportune Field? - Frank Kim](https://i.ytimg.com/vi/l-RZ22gFzjM/default.jpg)
![Securing Lift and Shift Cloud Migrations](https://i.ytimg.com/vi/yrq6qd6LKfQ/default.jpg)
![Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 2019](https://i.ytimg.com/vi/aAGsFzqb3pQ/default.jpg)
![Implementing an Effective Multi-Account Strategy on AWS](https://i.ytimg.com/vi/AK0yYIn34Ks/default.jpg)
![Why You Need Automation to Achieve Compliance in the Cloud](https://i.ytimg.com/vi/Zec0zCYFlZE/default.jpg)
![Non-People Identities: The New Battleground in Cloud Security](https://i.ytimg.com/vi/Kpo_a0LtoWo/default.jpg)
![Lessons Learned from Illumina's SecDevOps Transition SANS Secure DevOps Summit 2018](https://i.ytimg.com/vi/gDEtpOZ1qhs/default.jpg)
![SANS CloudSecNext 2022 Annual Summit - FREE!](https://i.ytimg.com/vi/pwPeWdb19xM/default.jpg)
![Begin Using SSH in AWS](https://i.ytimg.com/vi/V2_qLudp9M8/default.jpg)
![Management View of How Cloud Security Services Help Your Organization Leapfrog on Security](https://i.ytimg.com/vi/o-gAWqnszKI/default.jpg)
![2022 CloudSecNext Jon Zeolla](https://i.ytimg.com/vi/jwqR_gtjSOc/default.jpg)
![Bernard Brantley: Cutting Edge Cloud Thinking and Team Building | Season 2, Episode 2](https://i.ytimg.com/vi/vdrARW7nXs0/default.jpg)
![Cloud Wars: Episode II - Attack of the Packets](https://i.ytimg.com/vi/g6RpTQbPiH0/default.jpg)
![GitHub Actions: Protecting Your CI from Attackers](https://i.ytimg.com/vi/UrODXOiqH0k/default.jpg)
![PowerShell: Part 2: Audit and Compliance Data Acquisition with PowerShell](https://i.ytimg.com/vi/RoSl1_6fAc8/default.jpg)
![Head in the Clouds Ep 18: Benchmarking AWS Flow Logs](https://i.ytimg.com/vi/AmN-1LKPhP0/default.jpg)