AWS

Using CloudQuery to Identify Public Network Endpoints in AWS

A cheatsheet of SQL queries to use in CloudQuery to identify public network endpoints in AWS.

Scheduling Prowler Security scans in AWS

Short tutorial to set up recurring Prowler scans in AWS

Metabadger

Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).

Checkov

A static analysis tool for Infrastructure as Code (IAC) such as Terraform and CloudFormation. I contributed the underlying logic behind the AWS IAM Security scanning rules.

Endgame

An AWS Pentesting tool that lets you use one-liner commands to share AWS account's resources with a rogue AWS account - or to the entire internet.

Sensitive AWS API Calls That Return Credentials and Data

Worried about AWS IAM permissions that allow you to access data (like S3 objects, CodeCommit code, others) or return credentials in their response? I've updated my list of these potentially dangerous API calls and you can read about them here.

Cloudsplaining

An AWS IAM Security Assessment tool that identifies violations of least privilege & creates a risk-prioritized report.

Building Secure AWS AMIs: Building hardened CentOS AMIs from scratch

This tutorial covers building secure AWS AMIs with Packer. We go over building the prerequisite infrastructure to create EC2 AMIs from scratch, how to use the example hardening scripts for CentOS, and how to validate the testing with Amazon Inspector.

Policy Sentry

Generate Secure IAM Policies Automagically

Automating Least Privilege in AWS IAM with Policy Sentry

Introduction to Policy Sentry, an easy way to create least privilege policies by copying/pasting ARNs into a YAML file.