AWS

Sensitive AWS API Calls That Return Credentials and Data

Worried about AWS IAM permissions that allow you to access data (like S3 objects, CodeCommit code, others) or return credentials in their response? I've updated my list of these potentially dangerous API calls and you can read about them here.

Building Secure AWS AMIs: Building hardened CentOS AMIs from scratch

This tutorial covers building secure AWS AMIs with Packer. We go over building the prerequisite infrastructure to create EC2 AMIs from scratch, how to use the example hardening scripts for CentOS, and how to validate the testing with Amazon Inspector.

Automating Least Privilege in AWS IAM with Policy Sentry

Introduction to Policy Sentry, an easy way to create least privilege policies by copying/pasting ARNs into a YAML file.