SlideShare a Scribd company logo
Battle in the
Clouds: Attacker vs
Defender on AWS
Dani Goland
Mohsan Farid
Shared
Responsibility
Model
Hummus Bombing Celery Workers
Relay 101
Exchange Abuse
Exchange Abuse
Exchange Abuse
Exchange Abuse
Pivoting isn’t
always easy
but it sho is
fun!
Everybody
Wants To Rule
The World
Shell Yeah!
Lateral-aly
Post
Exploitation
Post
Exploitation
Post
Exploitation
Post
Exploitation
Post
Exploitation
Post
Exploitation
Post
Exploitation
Battle in the Clouds - Attacker vs Defender on AWS
Infrastructure As Code
(Hashicorp Terraform / AWS Cloudformation)
Immutable
Infrastructure(Hashicorp
Packer)
• Bake AMIs with Packer
• Use Ansible to harden the OS
• https://github.com/openstack/ansi
ble-hardening
Secret Management
• Hashicorp Vault/AWS SSM
Parameter Store
• Granular control over access
to secrets
• Automatic generation of
short-lived DB
credentials(Vault)
Interservice
Communication
• Use TLS
• Manage your own keys via
Vault
• Use Consul Connect sidecar
to automatically proxy your
traffic encrypted.
WAF
• AWS WAF Custom Rules or
Managed Rules
• Open Source Solutions Like
NAXSI(with NGINX)
https://github.com/nbs-system/naxsi
Example Architecture
• ALB à NGINX(w/ NAXSI) à ECS with Consul Connect Sidecar à Vault
AWS Services
Guard Duty – A threat detection
service that continuously monitors
for malicious activity and
unauthorized behavior.
Inspector - An automated security
assessment service that helps
improve the security and compliance
of applications deployed on AWS.
VirusBay
Registration Code:
“DEFCON27”

More Related Content

PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PDF
Pragmatic Cloud Security Automation
PPTX
Scaling Security in the Cloud With Open Source
PDF
Serverless security - how to protect what you don't see?
PPTX
Of CORS thats a thing how CORS in the cloud still kills security
PPTX
Automated Intrusion Detection and Response on AWS
PDF
Securing your AWS Deployments with Spinnaker and Armory Enterprise
PPTX
EKS security best practices
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Pragmatic Cloud Security Automation
Scaling Security in the Cloud With Open Source
Serverless security - how to protect what you don't see?
Of CORS thats a thing how CORS in the cloud still kills security
Automated Intrusion Detection and Response on AWS
Securing your AWS Deployments with Spinnaker and Armory Enterprise
EKS security best practices

What's hot (15)

PPTX
Native cloud security monitoring
PPTX
Crypto Miners in the Cloud
PDF
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
PPTX
Shift Left - How to improve your security with checkov before it’s going to p...
PDF
Netflix Open Source Meetup Season 4 Episode 3
PPTX
Security for Complex Networks on AWS
PDF
Mini-Training: Netflix Simian Army
PDF
Defending your workloads with aws waf and deep security
PDF
Brian Ketelsen - Microservices in Go using Micro - Codemotion Milan 2017
PPTX
Los Angeles AWS Users Group - Athena Deep Dive
PPTX
Securing AWS Accounts with Hashi Vault
PPTX
Packet Capture on AWS
PPTX
Shared Security Responsibility Model of AWS
PPTX
Cloud native policy enforcement with Open Policy Agent
PDF
AWS temporary credentials challenges in prevention detection mitigation
Native cloud security monitoring
Crypto Miners in the Cloud
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
Shift Left - How to improve your security with checkov before it’s going to p...
Netflix Open Source Meetup Season 4 Episode 3
Security for Complex Networks on AWS
Mini-Training: Netflix Simian Army
Defending your workloads with aws waf and deep security
Brian Ketelsen - Microservices in Go using Micro - Codemotion Milan 2017
Los Angeles AWS Users Group - Athena Deep Dive
Securing AWS Accounts with Hashi Vault
Packet Capture on AWS
Shared Security Responsibility Model of AWS
Cloud native policy enforcement with Open Policy Agent
AWS temporary credentials challenges in prevention detection mitigation
Ad

Similar to Battle in the Clouds - Attacker vs Defender on AWS (20)

PDF
The AWS Shared Responsibility Model in Practice
PPTX
AWS Security and Compliance Presentation
PPT
Aws training in bangalore
PDF
The AWS Shared Responsibility Model in Practice
PDF
Intro to threat_detection_and_remediation on aws
PDF
Datensicherheit mit AWS - AWS Security Web Day
PDF
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
PDF
Oas un llamado a la accion
PPTX
Pitt Immersion Day Module 5 - security overview
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
PDF
Amazon Web Services: Overview of Security Processes
PPTX
Hack proof your aws cloud cloudcheckr_040416
PPTX
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
PPTX
Building A Cloud Security Strategy for Scale
PPTX
Cloud Security.pptx
PDF
Security compute services_whitepaper
PPTX
Alert Logic: Realities of Security in the Cloud
PDF
Kernel Con 2022: Securing Cloud Native Workloads
PPTX
Security
PDF
Mitigating techniques
The AWS Shared Responsibility Model in Practice
AWS Security and Compliance Presentation
Aws training in bangalore
The AWS Shared Responsibility Model in Practice
Intro to threat_detection_and_remediation on aws
Datensicherheit mit AWS - AWS Security Web Day
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas un llamado a la accion
Pitt Immersion Day Module 5 - security overview
Hackproof Your Cloud: Responding to 2016 Threats
Amazon Web Services: Overview of Security Processes
Hack proof your aws cloud cloudcheckr_040416
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
Building A Cloud Security Strategy for Scale
Cloud Security.pptx
Security compute services_whitepaper
Alert Logic: Realities of Security in the Cloud
Kernel Con 2022: Securing Cloud Native Workloads
Security
Mitigating techniques
Ad

More from CloudVillage (8)

PDF
Build to Hack, Hack to Build
PDF
Phishing in the cloud era
PDF
Mining Malevolence: Cryptominers in the Cloud
PDF
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
PDF
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
PPTX
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
PDF
MozDef Workshop slide
PDF
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Build to Hack, Hack to Build
Phishing in the cloud era
Mining Malevolence: Cryptominers in the Cloud
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud
MozDef Workshop slide
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Mobile App Security Testing_ A Comprehensive Guide.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)

Battle in the Clouds - Attacker vs Defender on AWS