SlideShare a Scribd company logo
Filipi Pires
Director of Threat Researcher and Cybersecurity
Advocate 1
Choke Points: Practical
Tactics for Boosting Cloud
Security
Director of Threat Researcher and Security Advocate
Advocate Opensource/Community
Instructor, Writer and Reviewer
#WHOAMI
What is Threat?
3
# What is a Threat???
According to ISO 27005, a threat is defined as a
potential cause of an incident that may cause harm
to systems and organization.
• Software attacks
• Theft of intellectual property
• Identity theft
• Sabotage
• Information extortion are examples of
information security threats.
HVT- High-Value Target
# HTV – High-Value Target
In United States military terminology, a High-Value
Target (HVT) is the term given to a person or resource that
an enemy commander requires to complete a mission.
Which of your organization's staff members can provide
access to critically important information/systems and,
if compromised, could become a single point of failure?
Who are the ones that pose a high-impact risk if an attack
against them is successful?
Source:https://www.xmcyber.com/blog/attack-path-vs-attack-vector-important-differences-you-need-to-know/
HVTs are usually individuals in the C-Suite, board
members, senior executive management personnel,
executive assistants, teams, or people with elevated
privileges regarding information and organizational
assets (including technological assets).
Other times, they are teams of people working on
sensitive or high-stake projects. Individuals may also
turn into an HVT over a relatively short, specific period
of time if, during that time, they get to engage in a
critical project for the organization
Source:https://www.xmcyber.com/blog/attack-path-vs-attack-vector-important-differences-you-need-to-know/
# HTV – High-Value Target
Attack Vector
x
Attack Path
# Attack Vector
An attack vector is a method that cyber-attackers use to
compromise a system. Although the terms are sometimes
mixed, attack vectors are not to be confused with an attack
surface, which is best defined as every possible point
where an adversary can attempt to gain entry into your
network or system.
Malware, ransomware or phishing are all examples of
common attack vectors.
Some of the human errors that help create attack vectors
include:
• Having weak credentials
• Using ”poor“ encryption
• Misconfigurations
• Allowing access to sensitive information via privilege
escalation
# Attack Vector
# Attack Path
An attack path is a visualization of the chain of events that
occurs when attack vectors are exploited. In this sense,
an attack vector acts as a doorway, while an attack path
is a map that shows how an adversary entered the door
and where that adversary went.
https://owasp.org/www-project-top-ten/2017/Application_Security_Risks
Choke Points
# Choke Points
In cloud security, a choke point is a strategic location
where multiple attack paths converge before reaching
critical assets. These assets could include cloud resources,
endpoints, files, or folders that attackers may target to
advance toward more valuable objectives.
AWS IAM
# AWS IAM
AWS Identity and Access Management (IAM) is a web
service that helps you securely control access to AWS
resources.
With IAM, you can centrally manage permissions that
control which AWS resources users can access.
You use IAM to control who is authenticated (signed in)
and authorized (has permissions) to use resources.
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
# AWS IAM
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
# AWS IAM
Exploitation based
on permission...
# AWS Attack
# AWS Attack
# AWS Attack
# AWS Attack
# AWS Attack
# AWS Attack
# AWS Attack
# AWS Attack – Create Policy Version
27
# AWS Attack – AWSPX
Source: https://github.com/WithSecureLabs/awspx
How can senhasegura
help the community?
28
Filipi Pires
Director of Threat Researcher and Cybersecurity
Advocate
Demo
Thank you
https://filipipires.com
https://twitter.com/FilipiPires
https://github.com/filipi86
https://www.linkedin.com/in/filipipires/

More Related Content

PDF
The Rising Threat of Fileless Malware
PDF
Overview of the Cyber Kill Chain [TM]
PDF
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
PPTX
Cybersecurity
PDF
Web app security essentials | 2022
PPTX
Cyber Security Interview Questions and Answers | Cyber Security Interview Tip...
DOCX
Running head Cryptography1Cryptography16.docx
PDF
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
The Rising Threat of Fileless Malware
Overview of the Cyber Kill Chain [TM]
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
Cybersecurity
Web app security essentials | 2022
Cyber Security Interview Questions and Answers | Cyber Security Interview Tip...
Running head Cryptography1Cryptography16.docx
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine

Similar to Revealing Choke Points - Practical Tactics for Boosting Cloud Security (20)

PPTX
Appsec2013 assurance tagging-robert martin
PPTX
COMPUTER APPLICATIONS Module 4.pptx
PDF
Anatomy of a cyber attack
PPTX
Continuous security testing - sharing responsibility
PPTX
Introduction to cyber security
PPT
Introduction To Ethical Hacking
PDF
[Bucharest] Attack is easy, let's talk defence
PPTX
An An Exploration Into the Cyber Security
PPTX
FCT UNIT 5 Foundation of computing technologies.pptx
PPTX
Cyber Security Management in a Highly Innovative World
PPT
Security issues in the wireless networks.ppt
PPTX
2023 People Centric pitch01012023-v1.pptx
PPTX
Cyber security
ODP
Break it while you make it: writing (more) secure software
PPT
Handout infosec defense-mechanism-y3dips
PDF
Threat Intelligence & Threat research Sources
PDF
The Cyber Attack Risk
PDF
Malware in penetration testing 1
PDF
Apt zero day malware
PDF
What Is Denial Of Service Attack
Appsec2013 assurance tagging-robert martin
COMPUTER APPLICATIONS Module 4.pptx
Anatomy of a cyber attack
Continuous security testing - sharing responsibility
Introduction to cyber security
Introduction To Ethical Hacking
[Bucharest] Attack is easy, let's talk defence
An An Exploration Into the Cyber Security
FCT UNIT 5 Foundation of computing technologies.pptx
Cyber Security Management in a Highly Innovative World
Security issues in the wireless networks.ppt
2023 People Centric pitch01012023-v1.pptx
Cyber security
Break it while you make it: writing (more) secure software
Handout infosec defense-mechanism-y3dips
Threat Intelligence & Threat research Sources
The Cyber Attack Risk
Malware in penetration testing 1
Apt zero day malware
What Is Denial Of Service Attack
Ad

More from Cloud Village (18)

PPTX
Unexpected Leaks in AWS Transit Gateways
PDF
The Rise of the Planet of the Agents: LLM-based AI Agents and Cloud Security ...
PDF
Creating Azure Policy Compliant Backdoor
PPTX
Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities f...
PDF
Cloud Tripwires: fighting stealth with stealth
PPTX
Connecting the Dots - Mastering Alert Correlation for Proactive Defense in th...
PDF
Runtime Reachability: Prioritizing Vulnerabilities with eBPF & Continuous Pro...
PDF
Finding Holes in Conditional Access Policies
PPTX
One Click, Six Services - Abusing The Dangerous Multi-service Orchestration P...
PDF
Terraform Unleashed - Crafting Custom Provider Exploits for Ultimate Control
PPTX
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
PDF
DC 32: Epyon - Attacking DevOps environments
PDF
Exploit K8S via Misconfiguration .YAML in CSP environments
PDF
Cloud Offensive Breach and Risk Assessment (COBRA)
PDF
One Port to Serve Them All - Google GCP Cloud Shell Abuse
PDF
The Oracle Awakens: Demystifying Privilege Escalation in the cloud
PDF
Catch them all! Detection engineering and purple teaming in the cloud
PDF
Gone in 60 Seconds… How Azure AD/Entra ID Tenants are Compromise
Unexpected Leaks in AWS Transit Gateways
The Rise of the Planet of the Agents: LLM-based AI Agents and Cloud Security ...
Creating Azure Policy Compliant Backdoor
Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities f...
Cloud Tripwires: fighting stealth with stealth
Connecting the Dots - Mastering Alert Correlation for Proactive Defense in th...
Runtime Reachability: Prioritizing Vulnerabilities with eBPF & Continuous Pro...
Finding Holes in Conditional Access Policies
One Click, Six Services - Abusing The Dangerous Multi-service Orchestration P...
Terraform Unleashed - Crafting Custom Provider Exploits for Ultimate Control
Workshop: Hands-On Container Image Security Mastering Sigstore for Unbreachab...
DC 32: Epyon - Attacking DevOps environments
Exploit K8S via Misconfiguration .YAML in CSP environments
Cloud Offensive Breach and Risk Assessment (COBRA)
One Port to Serve Them All - Google GCP Cloud Shell Abuse
The Oracle Awakens: Demystifying Privilege Escalation in the cloud
Catch them all! Detection engineering and purple teaming in the cloud
Gone in 60 Seconds… How Azure AD/Entra ID Tenants are Compromise
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Spectroscopy.pptx food analysis technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
TLE Review Electricity (Electricity).pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Spectroscopy.pptx food analysis technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
OMC Textile Division Presentation 2021.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
1. Introduction to Computer Programming.pptx
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release

Revealing Choke Points - Practical Tactics for Boosting Cloud Security

  • 1. Filipi Pires Director of Threat Researcher and Cybersecurity Advocate 1 Choke Points: Practical Tactics for Boosting Cloud Security
  • 2. Director of Threat Researcher and Security Advocate Advocate Opensource/Community Instructor, Writer and Reviewer #WHOAMI
  • 4. # What is a Threat??? According to ISO 27005, a threat is defined as a potential cause of an incident that may cause harm to systems and organization. • Software attacks • Theft of intellectual property • Identity theft • Sabotage • Information extortion are examples of information security threats.
  • 6. # HTV – High-Value Target In United States military terminology, a High-Value Target (HVT) is the term given to a person or resource that an enemy commander requires to complete a mission. Which of your organization's staff members can provide access to critically important information/systems and, if compromised, could become a single point of failure? Who are the ones that pose a high-impact risk if an attack against them is successful? Source:https://www.xmcyber.com/blog/attack-path-vs-attack-vector-important-differences-you-need-to-know/
  • 7. HVTs are usually individuals in the C-Suite, board members, senior executive management personnel, executive assistants, teams, or people with elevated privileges regarding information and organizational assets (including technological assets). Other times, they are teams of people working on sensitive or high-stake projects. Individuals may also turn into an HVT over a relatively short, specific period of time if, during that time, they get to engage in a critical project for the organization Source:https://www.xmcyber.com/blog/attack-path-vs-attack-vector-important-differences-you-need-to-know/ # HTV – High-Value Target
  • 9. # Attack Vector An attack vector is a method that cyber-attackers use to compromise a system. Although the terms are sometimes mixed, attack vectors are not to be confused with an attack surface, which is best defined as every possible point where an adversary can attempt to gain entry into your network or system.
  • 10. Malware, ransomware or phishing are all examples of common attack vectors. Some of the human errors that help create attack vectors include: • Having weak credentials • Using ”poor“ encryption • Misconfigurations • Allowing access to sensitive information via privilege escalation # Attack Vector
  • 11. # Attack Path An attack path is a visualization of the chain of events that occurs when attack vectors are exploited. In this sense, an attack vector acts as a doorway, while an attack path is a map that shows how an adversary entered the door and where that adversary went. https://owasp.org/www-project-top-ten/2017/Application_Security_Risks
  • 13. # Choke Points In cloud security, a choke point is a strategic location where multiple attack paths converge before reaching critical assets. These assets could include cloud resources, endpoints, files, or folders that attackers may target to advance toward more valuable objectives.
  • 15. # AWS IAM AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. With IAM, you can centrally manage permissions that control which AWS resources users can access. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources. Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html
  • 26. # AWS Attack – Create Policy Version
  • 27. 27 # AWS Attack – AWSPX Source: https://github.com/WithSecureLabs/awspx
  • 28. How can senhasegura help the community? 28
  • 29. Filipi Pires Director of Threat Researcher and Cybersecurity Advocate
  • 30. Demo

Editor's Notes